Bookmarks Menu

Mozilla Firefox

Help and Tutorials
Customize Firefox
Get Involved
About Us
Aide et didacticiels
Personnaliser Firefox
Contribuer
À propos de Mozilla

Ubuntu and Free Software links

Ubuntu
Ubuntu Wiki (community-edited website)
Make a Support Request to the Ubuntu Community
Debian (Ubuntu is based on Debian)

Recent Tags
Constant Contact Review 2020 | Email Marketing and Survey Software Reviews - business.com

Mozilla Firefox

Customize Firefox

Bookmarks Toolbar

Tech_Startup

Trigger_Warnings_System

Existent_Solutions

VidAngel

VidAngel - Wikipedia
VidAngel | Watch Movies However The BLEEP You Want

Feerless

Team Feerless (@feerlessapp) / Twitter
Feerless app demo - YouTube

Founder

dmleong (Danielle Leong) · GitHub
Speaker: Danielle Leong | AlterConf
Danielle Leong - founder at Feerless
Danielle Leong (@tsunamino) / Twitter - feerless founder
QCon San Francisco | Danielle Leong | Engineering Manager on GitHub's Community and Safety Team
Consensual Software: How to Prioritize User Safety - Danielle Leong
Better Behavior in Tech? Danielle Leong asks for respectable conduct | Hack Reactor

Media_Coverage

Feerless Shows Trigger Warnings for People with PTSD
Feerless - melissacronin.com
Feerless Helps PTSD and Phobia Sufferers Avoid Triggering Moments While Watching Netflix | Medgadget
PTSD Trigger-Warning Apps : Feerless
Feerless
New App Will Make Netflix Binge-Watching Safer for People With PTSD | The Mighty

Content-control software - Wikipedia
Unconsenting Media
Trigger Warning Database
This Could Be Triggering.
Is It Consensual
is there suicide in it?
Common Sense Media: Age-Based Media Reviews for Families
Kids-In-Mind.com | Parents' Movie Guide, Ratings and Reviews
Where's The Jump? – A Movie Jump Scare Database
phobiasatthemovies.com/
Lit Triggers

Partial_Solutions

GitHub - bryantb2/OPES-FREEDOM: Trigger warning: you might not like this website if you have 5 cats and drive a mini-van.
GitHub - riadrahman013/Research-on-Early-Threat-Warning-via-Speech-and-Emotion-Recognition-from-Voice-Calls.-: The goal of this project or research was to create a very basic system to detect threat in voice calls by finding trigger words and emotion from each audio sample and then using those features to train the machine learning algorithm.
GitHub - annabelnlau/TW-: TW: [Trigger Warning] is a Chrome extension that creates an alert to warn a user of potentially sensitive content on Wikipedia.
GitHub - origami1/TriggerWarnings: Hate watching a movie only to have the <dog die | etc> at the very end? These are the movie ratings we really need.
GitHub - TimShier/TriggerWarning: A Chrome Extension to remove triggering content from your social media timelines.
GitHub - philhchen/trigger-warning: Analyzes and predicts the "inflammatory content" of a post using NLP sentiment analysis
GitHub - davidmason/trigger-warning: A browser plugin to teach the browser what you do not wish to see.
GitHub - DarkArtsAndSciences/trigger-warning: Boids with PTSD.
GitHub - fragmad/trigger-warning-wordpress: A Wordpress plugin to provide trigger warnings on contents and track their usage.
GitHub - matthewzapata/twitter-trigger-warnings: Predicting if a movie has a self-harm scene based on tweets.
triggerBlocker/triggerBlocker at master · cbursey/triggerBlocker · GitHub
Soothe - Chrome Web Store
Warn Me - Chrome Web Store
MovieCleaner - Chrome Web Store - subtitles / caption analysis
See No Evil 5.0 - Automatic Word Censor - Chrome Web Store
YouTube Audio Filtering - Chrome Web Store - subtitles captions analysis
Chrome Censored - Chrome Web Store
Ultimate Profanity Filter - Chrome Web Store

PTSD_resources

New study says trigger warnings are useless. Does that mean they should be abandoned?
Trauma trigger - Wikipedia
Do Trigger Warnings Work? - The Atlantic
'Trigger warnings' may do more harm than good, study finds
The latest study on trigger warnings finally convinced me they’re not worth it.
The Trouble with Trigger Warnings
Why trigger warnings are really so controversial, explained - Vox
Trigger Warnings Fail to Help and May Even Harm - Association for ...
Colleges, Don't Be So Quick On The Trigger Warnings. They May Misfire.
Pétition · Place trigger warnings on TV shows and films on streaming · Change.org
Startpage.com
PTSD Facts and Statistics | The Recovery Village
PTSD Treatment | The Recovery Village
NIMH » Post-Traumatic Stress Disorder (PTSD)
How Common is PTSD in Adults? - PTSD: National Center for PTSD

Idea_Development

Crowdsourcing-based

Firefox Extension Workshop | Get help creating & publishing Firefox extensions.
Browser Extensions - Mozilla | MDN
Your first extension - Mozilla | MDN
Your second extension - Mozilla | MDN
JavaScript APIs - Mozilla | MDN
bookmarks - Mozilla | MDN
webextensions-examples/background.js at master · mdn/webextensions-examples · GitHub
Popups - Mozilla | MDN
Popups - Mozilla | MDN
browserAction - Mozilla | MDN
Photon Design System
Build a secure extension | Firefox Extension Workshop
Developing extensions for Firefox for Android | Firefox Extension Workshop
Content scripts - Mozilla | MDN
Anatomy of an extension - Mozilla | MDN
Anatomy of an extension - Mozilla | MDN
manifest.json - Mozilla | MDN
Example extensions - Mozilla | MDN
GitHub - mdn/webextensions-examples: Example Firefox add-ons created using the WebExtensions API
browser-extension-template/package.json at master · notlmn/browser-extension-template · GitHub
Debugging | Firefox Extension Workshop
JavaScript console is more than console.log() | by Grigor Khachatryan | devgorilla | Medium
console - Web APIs | MDN
Startpage.com Search results
Building a cross-browser extension - Mozilla | MDN
Browser compatibility for manifest.json - Mozilla | MDN
Browser support for JavaScript APIs - Mozilla | MDN
MDN-Browser-Compatibility-Report-2020.pdf
Polyfill - MDN Web Docs Glossary: Definitions of Web-related terms | MDN
Extension Compatibility Tester
GitHub - mozilla/webextension-polyfill: A lightweight polyfill library for Promise-based WebExtension APIs in Chrome
Handling common JavaScript problems - Learn web development | MDN
One Browser Extension to Rule Them All | by Fabio Manganiello | Better Programming | Medium
Create a cross-browser extension in 2020 - Install and test your WebExtension - CAMYA
Cross-Browser Testing: Best Practices and Useful Resources - DZone Performance
Porting a Google Chrome extension | Firefox Extension Workshop
Chrome incompatibilities - Mozilla | MDN
Develop Extensions - Google Chrome
chrome.browserAction - Google Chrome
Sample Extensions - Google Chrome
Getting Started Tutorial - Google Chrome
Overview - Google Chrome
Chrome APIs - Google Chrome
Startpage.com Search results
chrome.tabs - Google Chrome
chrome.tabs - Google Chrome
Content Scripts - Google Chrome
Startpage.com Search results
javascript - Debug popup.html of a Chrome Extension? - Stack Overflow
Google Chrome / Firefox do not see extension output in console - Stack Overflow
Debugging Extensions - Google Chrome
tabs.removeCSS() - Mozilla | MDN
chrome.tabs - Google Chrome
javascript - browser.tabs.removeCSS is not working in Chrome extension? - Stack Overflow
Get Started with Debugging JavaScript in Chrome DevTools
How to use console.log() to debug a Chrome extension? - Stack Overflow
Startpage.com Search results
Chrome: console.log, console.debug are not working - Stack Overflow
Google is shutting down paid Chrome extensions - The Verge
Startpage.com Search results
How video streaming works on the web: An introduction | by Paul Berberian | CANAL+ TECH | Medium
Live streaming web audio and video - Developer guides | MDN
Streams API - Web APIs | MDN
Netflix Party is now Teleparty - Chrome Web Store
Netflix Party: synchronize Netflix video playback | Stephan Boyer
GitHub - netflixparty1/netflixparty-chrome: A tool for synchronized Netflix consumption.
Watch Netflix Together: A Chrome Extension Developed By A Malaysian
Metastream Remote – Get this Extension for 🦊 Firefox (en-US)
Metastream Remote - Chrome Web Store
Startpage.com Search results
Regarder Netflix dans Kodi sans se prendre la tête | Geekzone.fr
How to Install Netflix on Kodi – Actually Works in 2020
GitHub - CastagnaIT/plugin.video.netflix: InputStream based Netflix plugin for Kodi
GitHub - asciidisco/plugin.video.netflix: Inputstream based Netflix plugin for Kodi
Startpage.com Search results
Review of the new Firefox developer browser. Built for developers.
Upgraded - Wappalyzer

AI-powered

Amirai_Ziai-AI_Kissing_Detector

Amirai_Zirai_Resources

Amir Ziai – Towards Data Science
Amir Ziai - Senior Machine Learning Engineer - Netflix | LinkedIn
‪Amir Ziai‬ - ‪Google Scholar‬
amazon.com/Amir-Ziai/e/B07KFQ5SHD%3Fref=dbs_a_mng_rwt_scns_share
amirziai (Amir Ziai) · GitHub
Amir Ziai – Medium

A Netflix Scientist Has Taught An A.I. To Recognize Movie Kissing Scenes
GitHub - amirziai/kissing-detector: Kissing Detector - CS231n project

conv neural network - tuple object not callable when building a CNN in Pytorch - Stack Overflow
Startpage.com Search results
WhatsApp
A Netflix Scientist Has Taught An A.I. To Recognize Movie Kissing Scenes
GitHub - amirziai/kissing-detector: Kissing Detector - CS231n project
User Guide — MoviePy 1.0.2 documentation
movies description for visually impaired people at DuckDuckGo
artificial intelligence recognize movie genre at DuckDuckGo
Using AI to understand the way a movie “looks” and “sounds” like
Hollywood Is Using Artificial Intelligence To Pick Its Next Blockbuster
Deepfakes Are Going To Wreak Havoc On Society. We Are Not Prepared.
data-publi-5657.pdf
Y18-1007.pdf
Microsoft Word - Tanenbaum Genre Paper Draft 1.doc - Tanenbaum_GenreTree_Paper.pdf
guess movie genre from susbtitles at DuckDuckGo
Movie Genre Prediction Using Multi Label Classification
audio description netflix at DuckDuckGo
Audio description - Wikipedia
Using the Video Intelligence API with C#
IA Video – Analyse de contenus vidéo | Google Cloud
Violent scene detection algorithm based on kernel extreme learning machine and three-dimensional histograms of gradient orientation | SpringerLink
Startpage.com Search results
Startpage.com Search results
RUG01-001887239_2012_0001_AC.pdf
Classifying offensive sites based on image content
Speech-to-Text basics  |  Cloud Speech-to-Text Documentation
Startpage.com Search results
!etd.send_file
Filter unwanted YouTube comments the easy way
Alphabet's AI-powered Chrome extension hides toxic comments | Engadget
gadgethacks.com/
Startpage.com Search results
Audio Descriptions for Netflix Movies and TV Shows
Ultimate Guide to Audio Description – 3Play Media
AD on demand | The Accessible Digital Project
Startpage.com Search results
torch.Tensor — PyTorch master documentation
Module — PyTorch master documentation
torch.unsqueeze — PyTorch master documentation
What is the difference between view() and unsqueeze()? - PyTorch Forums
python - What does "unsqueeze" do in Pytorch? - Stack Overflow
Flatten, Reshape, and Squeeze Explained - Tensors for Deep Learning with PyTorch - deeplizard
python 3.x - TypeError: 'module' object is not callable in pytorch - Stack Overflow
Startpage.com Search results
Import AI 150: Training a kiss detector; bias in AI, rich VS poor edition; and just how good is deep learning surveillance getting? | Import AI
Startpage.com Search results
Startpage.com Search results
ResNet-18 convolutional neural network - MATLAB resnet18 - MathWorks France
Nevernude: Automatically cut out NSFW nudity from videos using Machine Box + ffmpeg | by Mat Ryer | Becoming Human: Artificial Intelligence Magazine
Predicting Movie Genres Based on Plot Summaries | by Kunal Gupta | Medium

Fingerprinting Images for Near-Duplicate Detection – Real Python - unique identifier, hashing

UAV-to-UAV_Anti-Crash_Communications

Existant_Solutions

Drone Anti-Crash Systems - Where The Safety Is A Number One Priority
Startpage.com Search results
A drone anti-collision system: Maintaining a fixed distance from a target during the flight - IEEE Conference Publication
Startpage.com Search results
12 Top Collision Avoidance Drones And Obstacle Detection Explained – DroneZon
Drone Collision Avoidance for Beginners - Terabee
Startpage.com Search results
Preparing the Ground for Drone Communications | IEEE Communications Society
Startpage.com Search results
UAV-to-UAV Communication Options for Civilian Applications - IEEE Conference Publication
UAV swarm communication and control architectures: a review - Journal of Unmanned Vehicle Systems

Bookmarks-Videos_Classifiers

Startpage.com Search results
benz2006automatic.pdf
Content Bookmarking and Recommendation - W12-5809.pdf
The 18 Best Read It Later and Bookmarking Apps | Zapier
Startpage.com Search results
Delicious (website) - Wikipedia
Startpage.com Search results
SiteBar - Wikipedia

Project_Management

Customer_Feedback_BCP

Startpage.com Search results
Customer Feedback Strategy: The Only Guide You'll Ever Need
Startpage.com Search results

5 Agile best practices | GitLab
Git Wars: Why I'm switching to GitLab | GitLab
A way for startups to build a solid IT infrastructure | GitLab
General Settings · Settings · TheElite · GitLab
unlimited private repos gitlab - Google Search
BEST 28 UML Tools in 2020
diagrams.net
best practices for team gitlab - Google Search
A Beginner's Guide to GitLab | Unito
GitLab Workflow: An Overview | GitLab
Introduction to GitLab Workflow - YouTube
GitLab in software development - part 1: Workflow
Confluence is where information goes to die - DEV
Project management 101: a phase-by-phase guide | Atlassian
GitLab Workflow: An Overview | GitLab
Introduction to GitLab Workflow - YouTube
GitLab in software development - part 1: Workflow
Wiki | GitLab
Startpage.com Search results
Org mode for Emacs – Your Life in Plain Text
agile - How to implement Epics on Gitlab without Enterprise Edition? - Project Management Stack Exchange
Epics/stories in GitLab FOSS - Stack Overflow
The Mythical Man-Month - Wikipedia

Ideation

Organic Startup Ideas
How to Start a Startup
Ideas for Startups
The Hardest Lessons for Startups to Learn
Essays
Beating the Averages
A Student's Guide to Startups
Hiring is Obsolete
Learning from Founders
Founders at Work: Stories of Startups; Early Days | Jessica Livingston | download
Founders at Work Stories of Startups Early Days by Jessica Livingston (z-lib.org).pdf
The Future of Web Startups
Disconnecting Distraction
Why to Start a Startup in a Bad Economy
Startups in 13 Sentences
Taste for Makers
Schlep Blindness
Why Smart People Have Bad Ideas
Startup Growth Calculator
Great Hackers
Haters
Startup = Growth
What We Look for in Founders
Why There Aren't More Googles
How Not to Die
Why Startup Hubs Work
Cities and Ambition
Why to Not Not Start a Startup
Subject: Airbnb
Founder Control
The Patent Pledge
Tablets
The Top Idea in Your Mind
Don't Talk to Corp Dev
Why It's Safe for Founders to Be Nice
The Fatal Pinch
What Startups Are Really Like
The Hardest Lessons for Startups to Learn
The 18 Mistakes That Kill Startups
The Hacker's Guide to Investors
A Fundraising Survival Guide
The Anatomy of Determination
How to Do What You Love
Ramen Profitable
Maker's Schedule, Manager's Schedule
Good and Bad Procrastination
Taste for Makers
General and Surprising
Half-Assed Startup: Start your company and keep your day job - Venture Hacks
You Weren't Meant to Have a Boss
Hiring is Obsolete
The Bus Ticket Theory of Genius
The Founder’s Guide To Selling Your Company | by Justin Kan | Justin Kan
The Founder’s Guide to Selling Your Company
What I've Learned from Hacker News
Startups in 13 Sentences
Why to Move to a Startup Hub
How to Make Wealth
Hackers and Painters: Big Ideas from the Computer Age: Graham, Paul: 9780596006624: Amazon.com: Books
Apply to Y Combinator
How to Apply to Y Combinator | Y Combinator
ycombinator.com/apply/dropbox
Lecture 3 - How to Start a Startup
Paul Graham – Do Things That Don't Scale | Genius
Sam Altman - How To Start A Startup - CS183B Lyrics and Tracklist | Genius
Paul Graham – How to Get Startup Ideas | Genius
How to Start a Startup
Walker Williams – Lecture 8: Doing Things That Don't Scale, PR, and How to Get Started | Genius
Startup Ideas: How the Best Founders Get Them and Why Novelty Is Overrated
Startpage.com Search results
Hype Cycle Research Methodology
5 Trends Appear on the Gartner Hype Cycle for Emerging Technologies, 2019 - Smarter With Gartner
Why the Lean Start-Up Changes Everything
Startpage.com Search results
The Rise of ``Worse is Better''
Rise of Worse Is Better
Startpage.com Search results
7 Smart and Cool Compact Tables | Furniture for small spaces, Furniture, Small spaces
Startpage.com Search results
Unicorn (finance) - Wikipedia
Five SpaceX Insights for Startups | Beta Solutions
What it took for Elon Musk’s SpaceX to disrupt Boeing, leapfrog NASA, and become a serious space company — Quartz
He's extremely smart and extremely hard-working; he has personally, aggressively... | Hacker News
Home - First Round Capital
How Design Thinking Transformed Airbnb from a Failing Startup to a Billion Dollar Business | First Round Review
Want to Be a Billionaire? Solve a Billion-Person Problem | Inc.com
Startpage.com Search results
These Are the 4 Secrets to Replicating Stripe’s Billion Dollar Growth | Drift
Startup Lessons: How Stripe Created A $35 Billion Giant
The Collison Brothers and Story Behind The Founding Of Stripe | Startup Grind
The Story Behind Payment Disruptor Stripe.com And Its Founder Patrick Collison | TechCrunch
How Stripe Marketed to Developers So Effectively - GrowthHackers
How Did Stripe Start and Challenge to PayPal? - Start Business Journey
Why online payments start-up Stripe is the No. 1 Disruptor 50 company
Elon Musk's 10 greatest inventions changing the world

Computer_Science

Algorithmics

Fundamentals

Recursion

Bit Manipulation & Recursion: Dreadful combinat... - Love for Programming - Quora

Automata_Theory

Generic Finite State Machine Revisited - CodeProject

Toc - Algorithmist
7 algorithms and data structures every programmer must know - Coding Security
algorithm - differences between time complexity and space complexity? - Stack Overflow
Algorithms: A Top-Down Approach
Planning Algorithms / Motion Planning
ho/Ullman Foundations of Computer Science - academic course
Dictionary of Algorithms and Data Structures
Love for Programming - Quora
The Art of Computer Programming by Knuth - Volume 1 Fundamental Algorithms
CSC236: Introduction to the Theory of Computation - Fall 2015 - academic course - simple/complete/structural mathematical induction - algorithm correctness
EECS 3101: Design and Analysis of Algorithms - academic course - algorithm correctness, iterative, recursive
Data Structures and Advanced Programming - academic course

Information_Retrieval_Algorithms

Algorithmics

Algorithms_Correctness

loop invariant at DuckDuckGo
prove algorithm correctness at DuckDuckGo
Loop invariant proofs must show three parts: at DuckDuckGo
Loop invariant - Wikipedia
Correctness (computer science) - Wikipedia
Model checking - Wikipedia
Verifying loops in C and C++ (intro) | David Crocker's Verification Blog
Verifying loops: proving termination | David Crocker's Verification Blog
Verifying loops – part 2 | David Crocker's Verification Blog
What is the best way of determining a loop invariant? - Stack Overflow
Precondition - Wikipedia
Postcondition - Wikipedia
Hoare logic - algorithm correctness algorithm
Invariant (mathematics) - algorithm correctness proofs
Correctness of recursive algorithms
correctness proof - True Postcondition, with true Precondition - Computer Science Stack Exchange
Newest 'correctness-proof' Questions - Computer Science Stack Exchange
Program Verification - hoare logic - algorithm correctness - Halting Problem
Loop invariants can give you coding superpowers - algorithm correctness
Loop Invariant Proofs - General Strategies for finding loop invariants
Loop Invariants on Demand
Hoare Logic - Notation - Algorithm correctness
An Axiomatic Basis for Computer Programming - hoare logic - algorithm correctness
Program/Algorithm Correctness - loop/class invariant - functional/imperative program - recursion and induction - induction proof - axiomatics - Hoare logic, triple
proof correctness recursive vs iterative algorithm at DuckDuckGo
Recursive Algorithm Correctness (Continued) - induction
Recursion and Loop Invariant
lec08-loop-invariant - definitive iterative vs recursive algorithm correctness
Iterative Algorithms - correctness
Recursion and Induction - algorithm correctness
algorithm - General proof strategies to show correctness of recursive functions? - Stack Overflow
Prove correctness of recursive algorithm - Computer Science Stack Exchange

Algorithms_Paradigms-Design_Techniques

Dynamic_Programming

Dynamic programming - Wikipedia
Dynamic programming – Anna Kryvulya – Medium
dynamic programming reconstruct best solution - Google Search
Memoization or Tabulation approach for Dynamic programming - Stack Overflow
What is the difference between memoization and dynamic programming? - Stack Overflow
Problem Overview - Dynamic Programming 2 | Coursera
Obtaining the actual steps of a solution that has been obtained using Dynamic Programming - Memoization, Backtracking
How to reconstruct the actual optimal solution obtained using dynamic programming - Quora
Category:Dynamic Programming - Algorithmist
Dynamic Programming Tutorial - Contents
GitHub - nobodyme/dynamic-programming: A tutorial aimed to give an understanding of common dynamic programming problems
Dynamic Programming – From Novice to Advanced – topcoder
Tutorial for Dynamic Programming | CodeChef
Are there any good resources or tutorials for dynamic programming (DP), besides the TopCoder tutorial? - Quora
algorithm - Good examples, articles, books for understanding dynamic programming - Stack Overflow
Understanding Dynamic Programming. I can't seem to visualize it in my head. ELI5 please. : algorithms
What are systematic ways to prepare for dynamic programming? - Quora
algorithm - A simple example for someone who wants to understand Dynamic Programming - Stack Overflow
TopCoder Forums
The Algebraic Dynamic Programming Homepage
lect1001.pdf
dp_mat.dvi - dp_mat.pdf
Dynamic Programming Practice Problems
I don't understand dynamic programming. What should I do? - Quora
Dynamic programming approaches - Anand
top-down vs bottom up dynamic programming at DuckDuckGo
Dynamic programming on whiteboard: top-down vs. bottom-up : cscareerquestions
algorithm - Dynamic programming and memoization: bottom-up vs top-down approaches - Stack Overflow
What is the difference between bottom up and top down dynamic programming method? - Quora
algorithms - Top-down, Bottom-up Dynamic programming - Computer Science Stack Exchange
recursion - Dynamic Programming - top-down vs bottom-up - Stack Overflow
Top-down and bottom-up design - Wikipedia
Tabulation vs Memoizatation - GeeksforGeeks
Can every problem on Dynamic Programming be solved by both top-down and bottom-up approaches? - Quora
Why is dynamic programming called dynamic programming? - Quora
terminology - What is "dynamic" about dynamic programming? - Computer Science Stack Exchange
Arcane Sentiment: Why “dynamic programming”?
algorithms - Dynamic programming: speed of top down vs bottom up approaches - Computer Science Stack Exchange
Dynamic Programming vs Divide-and-Conquer - definitive - memoization top-down vs tabulation bootom-up - definitive comparison
Tabulation vs Memoization - dynamic programming
algorithms - Is there a difference between top-down and bottom-up dynamic programming? recursion/recursive algorithm
DEFINITIVE - If you could rename dynamic programming... - definitive origin of the term - multistage planning, frugal bottom-up recursion - tabular/tabulated recursion, splice and combine, overlapping-divide-and-conquer, smart recursion - alternative names - memoization = dynamic programming by accident - discussion, comparison

Data_Structures

B-tree - Wikipedia
Linked list - Linked lists vs. dynamic arrays vs balanced tree vs random access list vs hashed array tree complexity time
Cracking the Coding Interview – Linked Lists – The Runner Technique | A Place For Poor Examples
Linked List Data Structure - Basic Implementation - Singly/Doubly Linked List
Deleting from a Linked List
List of data structures - Wikipedia
Abstract data type - ADT
Stack (abstract data type) - ADT - LIFO
Queue (abstract data type) - ADT - FIFO
Double-ended queue - deque - head-tail queue - FIFO
FIFO (computing and electronics) - First In First Out
Trying to Understand Tries - basecs - Medium
Self-balancing binary search tree - height-balanced BST - 2-3 tree AA tree AVL tree B-tree Red-black tree Scapegoat tree Splay tree Treap Weight-balanced tree
Binary search tree - BST - ordered or sorted binary trees -
Heap (data structure) - priority queues
Set (abstract data type) - Wikipedia
Associative array - map, symbol table, or dictionary - ADT - dictionary problem - hash table, search tree
Heaps and Priority Queues in C++ - Part 1: Heaps Basics - STL make_heap
Binary heap - binary tree - priority queue
Priority queue - ADT

Algorithms - ADUni

Computational_Complexity_Theory

NP-completeness - Wikipedia
Computational complexity theory - intractability - Wikipedia
NP-hardness - Wikipedia
Oracle machine - Wikipedia
P versus NP problem - Wikipedia
List of unsolved problems in computer science - Wikipedia
NP-easy - Wikipedia
Non-deterministic Turing machine - Wikipedia
Turing machine - Wikipedia
NTIME - Wikipedia
NP-equivalent - Wikipedia
NP-intermediate - Wikipedia
NP (complexity) - Wikipedia
The Status of the P Versus NP Problem | September 2009 | Communications of the ACM
computer science - What are the differences between NP, NP-Complete and NP-Hard? NP-completeness definitive explanation - Stack Overflow
EXPSPACE - Wikipedia
Decision problem - Wikipedia
Computability theory - automorphisms - reducibility - Wikipedia
Church–Turing thesis - In computability theory, the Church–Turing thesis (also known as computability thesis,[1] the Turing–Church thesis,[2] the Church–Turing conjecture, Church's thesis, Church's conjecture, and Turing's thesis) is a hypothesis about the nature of computable functions
Computable function - Turing machine
complexity - Trying to understand P vs NP vs NP Complete vs NP Hard - Software Engineering Stack Exchange
Reduction (recursion theory) - Turing reducibility
What is the difference between NP-hard and NP-complete? definitive - decision vs optimization problem - oracle machine - Quora
What is NP-hard and NP-complete? - Quora
Optimization problem - Wikipedia
Feasible region - In mathematical optimization, a feasible region, feasible set, search space, or solution space is the set of all possible points (sets of values of the choice variables) of an optimization problem that satisfy the problem's constraints, potentially including inequalities, equalities, and integer constraints.[1] This is the initial set of candidate solutions to the problem, before the set of candidates has been narrowed down.
Is the prime factorization problem in NP class? If not, supposing P = NP, would RSA encryption and other such algorithms which rely on prime factorization being hard be rendered ineffective? complexity - Quora
Complexity class - Wikipedia
What are the consequences of factoring being NP-complete? prime factorization - NP vs co-NP - Theoretical Computer Science Stack Exchange
Why isn't integer factorization in complexity P, when you can factorize n in O(√n) steps? trial factorization - Mathematics Stack Exchange
Design and Analysis of Algorithms NP Hard and NP- Proofs - Complete Classes
Computers and Intractability - Garey and Johnson book - Wikipedia
Computational Complexity: A Conceptual Perspective [Goldreich]
complexity theory - Is the prime factorization problem not an instance of the change making problem? - Computer Science Stack Exchange
definitive in-depths explanation - What is the definition of $P$, $NP$, $NP$-complete and $NP$-hard? Decision problems - problem reductions, subroutines/oracles/black boxes - Computer Science Stack Exchange
Beyond Computation: The P vs NP Problem - Michael Sipser - YouTube
Pseudo-polynomial time - primality test - Wikipedia
Determining complexity of an integer factorization algorithm - pseudo-plolynomial - Stack Overflow
Time complexity - constant, logarithmic, polylogarithmic, sublinear, linear, quasilinear, sub-quadratic, strongly/weakly polynomial, superpolynomial, quasi-polynomial, sub-exponential, exponential, double exponential
Primality test - cryptography - miller-rabin composite test - Wikipedia
Composite number - primality test - integer/prime factorization - Wikipedia
AKS primality test - also known as Agrawal–Kayal–Saxena primality test and cyclotomic AKS test
Prime Factorization using Sieve O(log n) for multiple queries - GeeksforGeeks
Prime factorization - OeisWiki
Efficient program to print all prime factors of a given number
elementary number theory - Algorithms for Finding the Prime Factorization of an Integer - Mathematics Stack Exchange
Which is the fastest prime factorization algorithm to date? - Quora
Integer factorization - prime factorization - primality test - cryptography, RSA - Wikipedia
ti basic - Prime factorization program (TI-84+) - Stack Overflow
integer/prime factorization algorithm - TI Calculator implementation in TI-BAISC
Prime Factorization - factors, trees, cryptography application | Brilliant Math & Science Wiki

Resources

GitHub - tayllan/awesome-algorithms: A curated list of awesome places to learn and/or practice algorithms.
What are the best books on algorithms and data structures? - Quora
GitHub - gzc/CLRS: Solutions to Introduction to Algorithms
Brilliant | Math and science done right
thyme/computer science at master · djtrack16/thyme · GitHub

Programming-Software_Engineering

Programming

Languages

Langage_Fundamentals

Serialization

terminology - What is the difference between Serialization and Marshaling? serialization is a particlar instance/part of marshaling - remote procedure call RPC
java - What is serialization? - Stack Overflow
Serialization - Wikipedia

Sigil (computer programming) - Wikipedia
String interpolation - Wikipedia

Function_Hooking-Callbacks-Signals

Hooking - Wikipedia
What is the difference between hook and callback? - Stack Overflow
Callback (computer programming) - Wikipedia
Event (computing) - Wikipedia
linux - Signals and interrupts a comparison - Stack Overflow
Signal (IPC) - vs hardware exception
What is the difference between signals, interruptions and exceptions? - Quora
Signals and Delegates

Type_System

Type_Conversion

Type conversion - Wikipedia
Type punning - Wikipedia

Type system - Wikipedia
Type theory - Wikipedia
Objects and Primitive Data
Introduction to Static and Dynamic Typing — SitePoint
What Every Computer Scientist Should Know About Floating-Point Arithmetic
binary - How to tell if an integer is signed or not? - Stack Overflow
Type signature - function prototype, overloading

function hooking - Google Search
why diamond inheritance is bad at DuckDuckGo
multiple returns bad practice at DuckDuckGo
Operator (computer programming) - Wikipedia
terminology - What is the difference between a "function" and a "procedure"? - Stack Overflow
programming practices - Method vs Function vs Procedure - Software Engineering Stack Exchange
String (computer science) - Null-terminated - security concerns, code injection - Unicode, UTF-8/16/32
Global variable - Wikipedia

C-Cpp_programming

C_programming

Standards

C11_std

Introduction to C11 | Dr Dobb's
C11 Standard - ISO/IEC 9899:201x - n1570.pdf
C11 Standard - ISO/IEC 9899:201x - n1570 - Committee Official Draft

c++ - Exotic architectures the standards committees care about - Stack Overflow
List of platforms supported by the C standard - Stack Overflow
language lawyer - Are there any non-twos-complement implementations of C? - Stack Overflow
C POSIX library - Wikipedia
C standard library - Wikipedia
The GNU C Library - glibc
Modern C - C11/C18 - jens gustedt

Memory_Model-Management_in_C

Memory model - cppreference.com
C dynamic memory allocation - Advantages/disadvantages to casting - security risk of stack smashing - malloc, free, dlmalloc - wild/dangling pointers - sbrk system call - hoard malloc - thread-catching malloc - OpenBSD malloc - FreeBSD/NetBSD jemalloc - In-Kernel malloc - realloc, calloc - malloc failure check
Memory Allocation | Intel® Threading Building Blocks Documentation
Memory Allocation
A Memory Allocator - malloc standard implementation
c - Do I cast the result of malloc? - Stack Overflow
c - Why am I not getting a segfault error with this simple code? - Stack Overflow
When is casting void pointer needed in C? %p format specifer, (u)intptr_t conversion - variadic function as printf -
What's wrong with casting malloc's return value?
malloc in C - cppreference.com
_Alignof operator - cppreference.com
C dynamic memory management library - cppreference.com
free in C - cppreference.com
c - Specifically, what's dangerous about casting the result of malloc? - Stack Overflow
Memory Allocation - malloc, free
casting - Why does "The C Programming Language" book say I must cast malloc? - Stack Overflow
When do I need to cast the result of malloc in C language? - Stack Overflow
programming - Is using malloc() and free() a really bad idea on Arduino? - memory fragmentation - setup() function - BSS segment
Your Smartphone Has a Special Security Chip. Here’s How It Works - arm trust zone, samsung KNOX, firmware, Titan M
malloc memory allocation scheme in C - memory alignment - fragmentation
How Memory Allocation Affects Performance in Multi-Threaded Programs - malloc
Objects and alignment in C- storage duration, lifetime, representation - strict aliasing - complete/effective type - struct padding to satisfy alignment requirements - alignof - trap representation - memcpy, memove -endiannes, little/big endian

References

C Language FAQ - definitive reference
Index of /~nsz/
Main Page - C programming
C11 standard - Rob's Programming Blog

Networking-Socket_Programming

A complete Windows network programming (Winsock2) tutorials with C working code and program examples
The Linux socket TCP/IP protocols network programming tutorials using open source GNU compiler with C language through working program examples and code samples on Linux client-server configuration
A Windows socket/Winsock2 TCP/IP network programming tutorials using C language with illustrations with working client-server C program examples and C code samples
sockets - Does listen() backlog affect established TCP connections? accecpt() - TCP socket
Linux Network Programming - tcp listen() backlog - three way handshake - accept()

Misc

c - Is errno thread-safe? POSIX requirement - -D_REENTRANT - Stack Overflow

Error-Exception_Handling

errno in C - perror/strerror - thread-local- cppreference.com
perror in C
strerror, strerror_s, strerrorlen_s in C
What is `perror` in C?
c - When should I use perror("...") and fprintf(stderr, "...")? - Stack Overflow
Error handling - errno_t, rsize_t, RSIZE_MAX - static_assert/assert
The problem with strerror_r() - improvement
Error numbers - errno macros - EDOM, EILSEQ, ERANGE
ERR30-C. Set errno to zero before calling a library function known to set errno, and check errno only after the function returns a value indicating failure - secure coding - in band / out of band error indicator

linux - How to install man pages for C standard library functions in Ubuntu? linux manual libc - install manpages-dev, manpages-posix-dev, glibc-doc, glibc-doc-reference

Multithreading-Concurrent_Prorgamming

c++ - Why can't I use strerror? strerror_r() vs C11 strerror_s() - thread safety
Avoid race conditions when using library functions - - thread safety - secure coding - rand(), srand(), Do not use the rand() PRNG - getenv(), getenv_s() - strtok(), strtok_s() in C11 Annex K strtok_r() in POSIX - strerror(), strerror_s() in C11 Annex K strerror_r() in POSIX - asctime(), ctime(), localtime(), gmtime() asctime_s(), ctime_s(), localtime_s(), gmtime_s() in C11 Annex K setlocale() - ATOMIC_VAR_INIT, atomic_init() - tmpnam(), tmpnam_s() in C11 Annex K - tmpnam_r() in POSIX mbrtoc16(), c16rtomb(), mbrtoc32(), c32rtomb(), mbstate_t - data race - re-entrancy, re-entrant functions - errno

The Definitive C Book Guide and List - Stack Overflow
Win32 x86 Calling Conventions - CodeProject
c - Implementation of __builtin_clz - Stack Overflow
GitHub - stevefan1999/TinyGenericC: Tiny C Libraries that exploits undefined behaviors to achieve generic programming
Security-Oriented C « Null Byte :: WonderHowTo
C (programming language) - Wikipedia
GNU C Library - glibc, fork of linux libc - The GNU C Library project provides the core libraries for the GNU system and GNU/Linux systems, as well as many other systems that use Linux as the kernel. These libraries provide critical APIs including ISO C11, POSIX.1-2008, BSD, OS-specific APIs and more. These APIs include such foundational facilities as open, read, write, malloc, printf, getaddrinfo, dlopen, pthread_create, crypt, login, exit and more - Embedded systems
Gnulib - Wikipedia
Glibc and static linking [LWN.net]

Coding_Standards-Styles

On goto statement relevance - coding styles/standards, best practices BCP
Should I use symbolic names like TRUE and FALSE for Boolean constants, or plain 1 and 0? coding style/standard
Linux kernel coding style - coding standards — The Linux Kernel documentation - ideal indentation - definitive
Where can I get the ``Indian Hill Style Guide'' and other coding standards? - coding styles/standards, best practices BCP
Is it acceptable for one header file to #include another? nested include files - coding styles/standards, best practices BCP
ioctl - input/output control - system call for device-specific input/output operations and other operations which cannot be expressed by regular system calls - - fcntl, ipfw, setsockopt - IPC - security, userspace, buffer overflow

Cpp_programming

References

Sutter’s Mill | Herb Sutter on software development
Bjarne Stroustrup's Homepage
ISO Standard C++
C++ FAQ
Modern C++ for C programmers—bert hubert : Standard C++
c++ faq - The Definitive C++ Book Guide and List - Stack Overflow
Stroustrup: C++ Style and Technique FAQ
Fluent C++ - Jonathan Boccara's blog
Linux C++ Software Development - endianness/byte order conversion,

Boost_Framework

beast boost c++ at DuckDuckGo

Qt_Programming

Signals & Slots | Qt 4.8
Using the Meta-Object Compiler (moc) | Qt 4.8
Signals and slots - Wikipedia
c++ - Qt events and signal/slots - Stack Overflow

Coding_Standards

CppCoreGuidelines/CppCoreGuidelines.md - RAII
isocpp/CppCoreGuidelines: The C++ Core Guidelines are a set of tried-and-true guidelines, rules, and best practices about coding in C++
Some C++ good practices from the OpenCV source code – CppDepend Blog

Memory_Model-Management_in_Cpp

Pointers_VS_References

c++ - Reference to a pointer - Stack Overflow
c++ - warning: returning reference to temporary - Stack Overflow
c++ - Pointer vs. Reference - Stack Overflow
c++ - Pointer to reference - Stack Overflow
c++ - Difference between pointer to a reference and reference to a pointer - Stack Overflow
c++ - difference between a pointer and reference parameter? - Stack Overflow
Passing references to pointers in C++ - Stack Overflow
What are the differences between a pointer variable and a reference variable in C++? - Stack Overflow
c++ - Pointer vs. Reference - Stack Overflow
Pointers vs References in C++ - GeeksforGeeks
c++ - About pointer and reference syntax - Stack Overflow
c++ - When to use references vs. pointers - Stack Overflow
Passing Reference to a Pointer in C++ - GeeksforGeeks
c++ - Does a const reference class member prolong the life of a temporary? vs const local references - Stack Overflow
c++ - Why not non-const reference to temporary objects? - Stack Overflow
c++ - Returning temporary object and binding to const reference - definitive succint answer -Stack Overflow

Multi-Threading_with_SL

C++11 Multithreading – Part 1 : Three Different ways to Create Threads – thisPointer.com

C++ Memory model - cppreference.com
Dynamic memory management - cppreference.com
What is memory fragmentation? - Stack Overflow
make_shared c++ fragmented memory - Google Search
make_shared c++ advatanges drawbacks - Google Search
c++ - RAII vs. Garbage Collector - Stack Overflow
Modern C++ isn't memory safe, either
We make any object thread-safe - CodeProject
Asynchronous Multicast Delegates in C++ - CodeProject
Thread Wrapper for Modern C++ - CodeProject
We make a std::shared_mutex 10 times faster - CodeProject
C++/WinRT: Understanding Async | Kenny Kerr
c++ - Memory Allocation/Deallocation? - Stack Overflow
C++: Memory allocators - Stack Overflow
What are static and dynamic binding in C (strictly C,not C++)? - Stack Overflow
multithreading - C++11 introduced a standardized memory model. What does it mean? And how is it going to affect C++ programming? - Stack Overflow

Objects_Construction_Destruction

Why the Destructor in C++ de-allocated memory in reverse order of how they were initialised? - Stack Overflow
c++ - Why does the order of destruction for data member matter? - Stack Overflow
exception - Object destruction in C++ - definitive answer - local/non-local/namespace static variables, scoped/dynamic object - Order of construction/destruction - Stack Overflow
c++ - Do class functions/variables have to be declared before being used? definitive - class definition layout - coding standard - Stack Overflow
c++ - Why is the 'Declare before use' rule not required inside a class? class definition layout - coding standard - Stack Overflow
c++ - What is The Rule of Three? rule of five - rule of zero - Stack Overflow
Copy constructor (C++) - Wikipedia
Default constructors - cppreference.com
Copy constructors - default - cppreference.com
Move constructors - default - cppreference.com
Destructors - default - cppreference.com
Move assignment operator - default - cppreference.com
Copy assignment operator - default - cppreference.com
c++ - Rule-of-Three becomes Rule-of-Five with C++11? - Stack Overflow
Rule of Zero - three - five @ Flaming Dangerzone
constructor - C++ default destructor - Stack Overflow
c++ - The new keyword =default in C++11 - aggregate, POD - trivial/non-trivial -constexpr - Stack Overflow

Memory Management - memory leaks - C++ FAQ
std::malloc in C++ - cppreference.com
Object in C++ - Object representation and value representation - Subobjects - Polymorphic objects - Strict aliasing - Alignment requirements
What is Heap Fragmentation? | C++ for Arduino
Strategies for the Allocation of Memory - dynamic/static allocation - fragmentation - new/delete operators - memory pool

Types

c++ - Regular cast vs. static_cast vs. dynamic_cast - Stack Overflow
Why does C++ require a cast for malloc() but C doesn't? - Stack Overflow
language features - Why aren't `void *`'s implicitly cast in C++? - Software Engineering Stack Exchange

Constant_Methods

c++ - Why using the const keyword before and after method or function name? - Stack Overflow

c++ - When should static_cast, dynamic_cast, const_cast and reinterpret_cast be used? - Stack Overflow
Explicit type conversion in C++
std::underlying_type - cppreference.com
Enumeration declaration - cppreference.com
c++ - How to automatically convert strongly typed enum into int? - Stack Overflow
Which variables should I typecast when doing math operations in C/C++? type conversion - typecasting one operand - Rules/ANSI C Rules compilers follow when dealing with typecast - overflow - definitive answer - Stack Overflow

Runtime_Considerations

C++ RTTI Viable Examples - Stack Overflow
stackoverflow.com/questions/5062220/does-rtti-mean-dynamic-binding
RTTI and security - cpp
stackoverflow.com/questions/11332075/comparing-polymorphic-base-types-in-c-without-rtti
RTTI (Run-time type Information) in C++ - GeeksforGeeks
Can RTTI cause security issues on certain platforms? - Stack Overflow
How expensive is RTTI? - Stack Overflow

Network_Programming

Boost_Asio

Basic Boost.Asio Anatomy - 1.65.1
c++ - io_service, why and how is it used? - Stack Overflow

https://github.com/fffaraz/awesome-cpp#networking
Mocking socket calls in C++ - Code Review Stack Exchange
Unit testing Client/Server App in C++ - Stack Overflow

C++17

The C++ Standard Library: The Second Edition includes C++17 - grimm-jaud.de
Modern C++ CI | Juan Medina Personal Blog
Towards a more powerful and simpler C++ with Herb Sutter | CLion Blog
C++17 Final Standard Is Now Official
C++17 - Wikipedia
C++ : Get the list of all files in a given directory and its sub-directories using Boost & C++17 – thisPointer.com

Template_Metaprogramming

“Modern C++ Template Programming” with Nicolai Josuttis : Standard C++
Template metaprogramming - Wikipedia
Expressive C++ Template Metaprogramming - Fluent C++
typename - Wikipedia
c++ - Officially, what is typename for? - Stack Overflow
C++ keywords: typename - cppreference.com
Parameter pack(since C++11) - variadic template - cppreference.com

Containers

C++: C-Style arrays vs. std::array vs. std::vector
std::array - C-Style Native Arrays
C++ Core Guidelines: std::array and std::vector are your Friends - definitive comparison
c++ - std::array vs array performance - Stack Overflow
Containers library - Thread Safety - sequence/associative/unordered associative containers
std::vector - vector<bool> space-efficient dynamic bitset
c++ - 'size_t' vs 'container::size_type' - Stack Overflow
std::unordered_map - cppreference.com
What's the C++ version of Java's ArrayList - std::vector
Data structures and algorithms problems in C++ using STL
String Concatenation in C++ Done the Right Way
The Complete Guide to Building Strings In C++: From "Hello World" Up To Boost Karma - definitive
c++ - std::stringstream vs std::string for concatenating many strings - concatenation, formatting
4350% Performance Improvement with the StringBuilder for C++! - CodeProject
String concatenation time complexity c++ - Stack Overflow
String concatenation complexity in C++ and Java - time complexity
std::forward_list - cppreference.com
std::begin, std::cbegin - cppreference.com
A Comprehensive Guide To Singly Linked List Using C++ | Codementor
C++ : Different Ways to iterate over a List of objects – thispointer.com
c++ - Iterator invalidation rules - erase_after forward_list
c++ - How get next (previous) element in std::list without incrementing (decrementing) iterator? - Stack Overflow
c++ - New iterator requirements - Stack Overflow
Printing out contents of a list from the c++ list library - Stack Overflow
pointers - Can I check a C++ iterator against null? - end()
std::next - cppreference.com
std::forward_list<T,Allocator>::erase_after - delete list node
c++ - What is an iterator in general? - Stack Overflow
c++ - Can you remove elements from a std::list while iterating through it? erase - for loop - troubleshoot
c++ - Subclass/inherit standard containers? - inheritance - design choice
How check if a given key exists in a Map | C++ – thispointer.com
c++ - Is there any advantage of using map over unordered_map in case of trivial keys? - Stack Overflow
Choosing the Right Container: Associative Containers — Embedded Artistry
Set vs Map : How to choose a right associative container ? – thispointer.com
map vs. unordered_map in C++ - binary balanced tree - red/black tree - hash_map - definitive comparison - implementations
std::hash - cppreference.com
std::stack - cppreference.com
C++ STL stack question: Why does pop() not throw an exception if the stack is empty? - Stack Overflow
std::deque - cppreference.com
Standard Template Library - STL containers list
Associative containers in C++ STL - std::set, map, multiset, multimap
Unordered associative containers (C++) - definitive - code examples - std::unordered_map - STL - custom hash function template specialization
Lookup table - hash tables, hash fucntion - bitwise operations examples
Treap - Wikipedia
C++ Standard Library - STL
Sequence container (C++) - list, forward_list, deque, array - vector specialization for bool bit field
Hash-Based Sets and Maps - unordered

Pointers_VS_References

How is reference implemented internally? - Stack Overflow
How references are internally stored in c++? - Stack Overflow

Design_Patterns_in_Cpp

work stealing pattern c++ at DuckDuckGo
performance - Why are template mixins in C++ not more of a mainstay? - Stack Overflow
Mixin Classes: The Yang of the CRTP - Curiously Recurring Template Pattern - Fluent C++
Perfect Singleton in C++11
C++ way of dependency injection - Templates or virtual methods? - Stack Overflow
c++ - Why prefer template method over dependency injection? - Stack Overflow
dependency injection : Standard C++
AspectC++ - Wikipedia
c# - Is dependency injection useful in C++ - Stack Overflow
Use your singletons wisely
c++ - How is Meyers' implementation of a Singleton actually a Singleton - Stack Overflow
c++ - Is Meyers' implementation of the Singleton pattern thread safe? - local static initilization - Stack Overflow
c++11 - Singleton class and correct way to access it in C++ - Code Review Stack Exchange
c++ - Use of deleted copy constructor in the singleton - Stack Overflow
C++ Singleton design pattern - heap alocation - memory leak - Meyer's Singleton - Stack Overflow
Thread-Safe Initialization of a Singleton - ModernesCpp.com
c++ - Use of deleted copy constructor in the singleton - Stack Overflow

Misc

Should I use noexcept for getters always? - Stack Overflow
noexcept practice for style and performance? - Stack Overflow
A beginner’s look at smart pointers in modern C++ : Standard C++
When and why do I need to use cin.ignore() in C++? - Stack Overflow
When to Use Enums and When to Use Tag Dispatching in C++—Jonathan Boccara : Standard C++
Your handy cut-out-and-keep guide to std::forward and std::move - Sticky Bits
How to Use Tag Dispatching In Your Code Effectively - Fluent C++
What's the difference between "STL" and "C++ Standard Library"? - Stack Overflow
c++ - What is the difference between the standard library and the standard template library? - STL vs SL - Stack Overflow
Array initialization use const variable in C++ - Stack Overflow
c++ - Why should I not #include <bits/stdc++.h>? - Stack Overflow
c++ - *.h or *.hpp for your class definitions - Stack Overflow
filenames - C++ code file extension? .cc vs .cpp - Stack Overflow
c++ - .c vs .cc vs. .cpp vs .hpp vs .h vs .cxx - Stack Overflow
c++ - What is the meaning of prepended double colon "::"? namespace resolution
Unqualified name lookup - name that does not appear to the right of a scope resolution operator :: - namespace
Argument-dependent name lookup - ADL - argument-dependent name lookup- Koenig Lookup - namespaces, scope resolution operator :: double column

Input-Output

Input/output via iostream and cstdio - std::cin - std::endl vs \n - friend stream insertion operator << - encapsulation violation and friend keyword - istream conversion to boolean in while (std::cin >> foo)
stdin - How to read n integers from standard input in C++? definitive methods to read user input
c++ - Best way to get ints from a string with whitespace? - Stack Overflow
reading unknown number of integers from stdin (C) - Stack Overflow
std::cin, std::wcin - cppreference.com
c++ - What does flushing the buffer mean? - Stack Overflow
What does buffer flush means in C++ ? - GeeksforGeeks
std::endl - cppreference.com
coding style - C++: "std::endl" vs "\n" - Stack Overflow
How to split a string in C++ - Fluent C++
std::getline - delimiter char, split string, tokenize
std::basic_istringstream - cppreference.com
Read file line by line using ifstream in C++ - tokenization, line/token based input reading
std::to_string - integer to ascii itoa()
c++ - Conditional operator used in cout statement - inline if precedence in cout statement
fflush in C
c - How can you flush a write using a file descriptor? - Stack Overflow
c++ - How can fopen_s be more safe than fopen? C11 Annex K
FIO03-C. Do not make assumptions about fopen() and file creation - fopen_s() C11 - secure coding

What are copy elision and return value optimization? RVO - Stack Overflow

Object_Oriented_Concepts

Static class equivalent in C++ - namespace
Are utility classes with nothing but static members an anti-pattern in C++? - Software Engineering Stack Exchange
Why would one use nested classes in C++? - definitive - PIMPL Idiom - Scoping - Non polluting namespace
nested classes - cppreference.com

Language_Core

for loop - cppreference.com
while loop - cppreference.com

The Expressive C++17 Coding Challenge (in Rust)
What's the closest thing in C++ to retroactively defining a superclass of a defined class? - Stack Overflow
How to create a loading bar in c++ - Coding Security
Metaclasses, the Ultimate Answer to Strong Typing in C++? - Fluent C++
GitHub - SaadAhmad/in_constexpr: An approach for runtime detection inside a constexpr function
Why you should really care about C/C++ static analysis
Interactive Workflows for C++ with Jupyter – Jupyter Blog
Assertion dans les fonctions constexpr
Exception handling in constructors – Cpp-Station – Medium
Units and measures for C++ 11 - CodeProject
Improving compile times of C++ code
c++ - What is the easiest way to initialize a std::vector with hardcoded elements? - Stack Overflow
GitHub - OculusVR/Flicks: A unit of time defined in C++.
cppdepend.com/blog/?p=294&utm_content=buffer90b4d&utm_medium=social&utm_source=facebook.com&utm_campaign=buffer
Minimizing <windows.h> · Aras' website
A Flexible Reflection System in C++: Part 2
foonathan::blog() - Guidelines for constructor and cast design
On the state of cross-compilation in the C++ World – Corentin – Medium
Bartek's coding blog: What happens to your static variables at the start of the program?
The 15 C++11 features you must really use in your C++ projects. – CppDepend Blog
Lvalues, rvalues and their references - Fluent C++
Common misconception with C++ move semantics – Page Fault Blog
Understanding C/C++ Code Behavior by Analyzing Assembler Output - CodeProject
Modern C++: 7 Ways to Fake It Until You Have It—Jonathan Boccara : Standard C++
C++ : How to read or write objects in file | Serializing & Deserializing Objects – thispointer.com
La sérialisation avec Boost
Serialization
operator overloading - cppreference.com
inline specifier in C++ - cppreference.com
Why assignment operator return by reference and not by value - C++ Forum
Non-static member functions - cppreference.com
Default comparisons(since C++20) - default - cppreference.com

Optimization-Performance

Doing a lot of mathematical calculations fast and accurately — Mathieu Bouville, PhD
Inheritance — dynamic binding, virtual functions C++ FAQ
Answer - Quora
Need for Speed - C++ versus Assembly Language - CodeProject
Does software performance still matter? – Daniel Lemire's blog
Do Understandable If Statements Run Slower? - Fluent C++
How to Optimize Compilation Times with Precompiled Headers (PCH Files) - CodeProject
assembly - Why doesn't GCC optimize a*a*a*a*a*a to (a*a*a)*(a*a*a)? - Stack Overflow
c++ - Replacing a 32-bit loop count variable with 64-bit introduces crazy performance deviations - Stack Overflow
c++ - Boolean values as 8 bit in compilers. Are operations on them inefficient? - Stack Overflow
Optimizing software in C++ - optimizing_cpp.pdf
Software optimization resources. C++ and assembly. Windows, Linux, BSD, Mac OS X
Loop unrolling - Optimization

Misc

Peculiar_Behaviors

Unspecified, undefined and implementation defined behavior WIKI for C - UsB vs UB vs IDB - definitive definitions, comparison
GitHub - stevefan1999-personal/TinyGenericC: Tiny C Libraries that exploits undefined behaviors to achieve generic programming
c++ - What exactly do "IB" and "UB" mean? - Undefined Behavior
LLVM Project Blog: What Every C Programmer Should Know About Undefined Behavior #1/3
A Guide to Undefined Behavior in C and C++, Part 1 – security risk - secure coding
Undefined behavior - cppreference.com
Undefined behavior - integer overflow, side effects - sequence points - increment operator - CHAR_BIT, bitwise operators, shifting by negative number
Undefined behavior in C
Undefined Behavior and Fermat’s Last Theorem

Function_Calls-Functions_Pointers

C Function Pointers Alternate Syntax - Nick Desaulniers
Function pointer - functors, method pointers
c - What is the difference between Function Pointer vs Function Call? - asynchronous mechanism
c++ - Get pointer to node in std::list or std::forward_list - Stack Overflow
c++ - what is the difference between function declaration and signature? - Stack Overflow
c++ - Calling a function through a function pointer - dereference the pointer or not? What's the difference? function pointer vs function call - definitive answer - chained dereferencing - function name/designator decays to function pointer

Memory_Management_in_C-Cpp

how is the heap shared between processes at DuckDuckGo
Is heap memory per-process? (or) Common memory location shared by different processes? - Stack Overflow

Data_Representation

sizeof_operator

sizeof operator in C++ - cppreference.com
sizeof - platform ABI, compiler
c++ - Is the sizeof(some pointer) always equal to four? - Stack Overflow
c - sizeof style: sizeof(type) or sizeof variable? - Software Engineering Stack Exchange
The C Book — Sizeof and storage allocation
how is sizeof operator implemented c - Recherche Google
Implement Your Own sizeof - GeeksforGeeks
c - implementation of sizeof operator - Stack Overflow
c - Why is it safer to use sizeof(*pointer) in malloc - definitive anwer - Stack Overflow
sizeof operator in C - CHAR_BIT
c - Is the operand of `sizeof` evaluated with a VLA? - Stack Overflow
c - Confusion with malloc - sizeof
runtime - Is sizeof in C++ evaluated at compilation time or run time? - Stack Overflow
c++ - sizeof operator compile-time or run-time - C99 VLAs
c - Sizeof operator Implementation : How it computes size at compile time? - C99/C11 variable length arrays - ABI platform specifications - compiler
c - Why is sizeof considered an operator? - Stack Overflow
c - How sizeof(array) works at runtime? - VLAs - definitive answer

Data Models and Word Size - Nick Desaulniers
int - In C storing values that start with zero get mutated, why? - Stack Overflow
c - Pointer representation - Stack Overflow
floating point - How to represent FLOAT number in memory in C - Stack Overflow
c - Can anyone explain representation of float in memory? - Software Engineering Stack Exchange
c - How are floating point numbers are stored in memory? - Stack Overflow
c - Are all pointers derived from pointers to structure types the same? - Stack Overflow
c++ - std::size_t vs size_t vs std::string::size_type - Stack Overflow
c++ - When is uint8_t ≠ unsigned char? - Stack Overflow
c++ - Difference between uint8_t, uint_fast8_t and uint_least8_t - Stack Overflow
c - Is there any reason not to use fixed width integer types (e.g. uint8_t)? - Stack Overflow
c++ - uint8_t VS uint32_t different behaviour - Stack Overflow
c++ - What is the size of a pointer? - Stack Overflow
c - Using long long integer to store 32 bit pointer causes printf to bug - Stack Overflow
Seriously, have any actual machines really used nonzero null pointers, or different representations for pointers to different types? memory model, internal representation, bit patterns
interchangeability of char* and void* as they share same size, representation and memory alignment
c - Issue with NULL pointers on Harvard Architecture platform - code addresses, data addresses representation, size

Data_Alignment

gcc - C undefined behavior. Strict aliasing rule, or incorrect alignment? - Stack Overflow
c - Data Alignment with network programming - Stack Overflow
macros - How to do data alignment in C? - Stack Overflow
The advantage of using __attribute__((aligned( ))) - compiler attributes - Software Engineering Stack Exchange
c++ - what is "stack alignment"? - Stack Overflow
c - Stack allocation, padding, and alignment - Stack Overflow
Coding for Performance: Data alignment and structures | Intel® Software
The Lost Art of Structure Packing - reducing memory waste - alignment, padding
Alignment in C - performance - consequence of misalignment - data structure alignment - padding - SSE, SIMD and 16 bytes boundaries - stack alignment - trade off between memory waste and performance - minimize memory waste by padding

Pointer_Arithmetics

Arrays_VS_Pointers

why is char array not modifiable in c at DuckDuckGo
Why array type object is not modifiable? - Stack Overflow
c - Difference between dereferencing pointer and accessing array elements - Stack Overflow
c - What is the difference between char s[] and char *s? - Stack Overflow
c - Character String Pointer vs. Array - Stack Overflow
c - Efficiency: arrays vs pointers - Stack Overflow
C: differences between char pointer and array - definitive answer - Stack Overflow
C pointer to array/array of pointers disambiguation - Stack Overflow
c++ - Dereferencing a pointer to an array? - Stack Overflow
c - Can we change the base address of an array through a pointer to array using brute force? - Stack Overflow
c - Cannot modify char array - Stack Overflow
c++ - Pointer to const char vs char array vs std::string - definitive
Difference between const char *p, char * const p and const char * const p - GeeksforGeeks
c++ - Difference between char pointer and char array - Stack Overflow
c - typcasting a character array to a const char * - Stack Overflow
What's difference between char s[] and char *s in C? - GeeksforGeeks
What is the difference between char array vs char pointer in C? definitive answer - Stack Overflow
c - char *array and char array[] - Stack Overflow
c - What is the difference between char s[] and char *s? - Stack Overflow
c - With arrays, why is it the case that a[5] == 5[a]? - Stack Overflow
c - Why do I get a segmentation fault when writing to a string initialized with "char *s" but not "char s[]"? array vs pointer - defitive answer - Stack Overflow
C strings pointer vs. arrays - Stack Overflow
Arrays and Pointers in C- definitive - cfaq
array vs pointer - definitive answer
But I heard that char a[] was identical to char *a.
So what is meant by the ``equivalence of pointers and arrays'' in C? pointer arithmetic and array indexing are equivalent in C, pointers and arrays are different - Definitive breakdown - decay of array into pointer, three exceptions
Since array references decay into pointers, if arr is an array, what's the difference between arr and &arr? definitive insight - type of addresss of array object
Practical difference between array and pointer - definitive
But I heard that char a[] was identical to char *a - char array vs pointer array - definitive comparison
I'm still mystified. Is a pointer a kind of array, or is an array a kind of pointer?
Why does some code carefully cast the values returned by malloc to the pointer type being allocated? Casting return of malloc - void pointer
c - Changing static array - Stack Overflow
c - Why local strings declared into the main function is part of Rodata segment memory? - static storage duration, string literals - definitive array vs pointer - literal copied onto stack space for array - memcpy - .LC0
DEFINITIVE - Pointers to arrays in C - array decay into pointers
c - Segmentation fault reversing a string literal - Stack Overflow
Why is this string reversal C code causing a segmentation fault? - array vs pointer -

Dangling, Void , Null and Wild Pointers - GeeksforGeeks
Dangling pointer - Wikipedia
wild pointer c - Google Search
const-ptrs.c
c++ - Why don't I get a segmentation fault when I write beyond the end of an array? - Stack Overflow
What exactly is a C pointer if not a memory address? - Stack Overflow
To what extent is it acceptable to think of C++ pointers as memory addresses? - Stack Overflow
Pointer implementation details in C - Stack Overflow
c++ - What does "dereferencing" a pointer mean? - Stack Overflow
c++ - How does dereferencing of a function pointer happen? - Stack Overflow
Pointer arithmetic for void pointer in C - definitive - GCC C Extension -
Addition of two pointers in c or c++ not supported. why? Pointer arithmetics - pointer addition forbidden while substraction allowed - cast to (u)intptr_t for addition - Stack Overflow
Null pointer - NULL, (void*) 0, nullptr - Dereferencing - Non mapped memory, segfault - vs memory address 0 - BIOS code - Undefined/Undesired Behavior -
c++ - Why can't you do bitwise operations on pointer in C, and is there a way around this? uintptr_t - Undefined Behavior, Implementation-Defined Behavior - Stack Overflow
c++ - What is the use of intptr_t? Memory Management Code - Stack Overflow
c - When is uintptr_t preferred over intptr_t? void* vs (u)intptr_t definitive comparison with examples - bitwise operation on pointers - intptr_t vs uintptr_t - flat virtual address space - CPUs DSP, CRAY Y-MP
Top 20 C pointer mistakes and how to fix them - secure coding

Null_Pointers

Null Pointers - C FAQ
c - What is the difference between a pointer pointing to 0x0 location and a pointer set to NULL? (void*)0, null pointer vs null pointer constant syntactic sugar - - Software Engineering Stack Exchange
What is this infamous null pointer, anyway?
If NULL and 0 are equivalent as null pointer constants, which should I use?
Null Pointers
What is this infamous null pointer, anyway? Compiler internal representation of null pointer constants for different pointer types
null pointer vs null pointer constant - 0 zero VS NULL macro - execl function null terminated call example - cast for variadic functions -
c - Is (int *)0 a null pointer? null pointer vs null pointer constant - definitive explanation - C vs C++
Pointer comparison with zero - Internal representation of null pointer - coding styles/standards, best practices
How should NULL be defined on a machine which uses a nonzero bit pattern as the internal representation of a null pointer? bit pattern generated for pointer representation by compiler - NULL vs 0 zero integer constant expression
definitive breakdown - null pointer constant 0 vs NULL macro vs NUL vs null string - This is strange. NULL is guaranteed to be 0, but the null pointer is not? internal representation bit pattern generation by compilers, transparent to C program writers
NUL vs. NULL - mnemonic poetry
If NULL and unadorned 0 are equivalent as null pointer constants, which should I use? NULL and 0 are interchangeable in pointer contexts, and uncast 0 is perfectly acceptable
But wouldn't it be better to use NULL (rather than 0), in case the value of NULL changes, perhaps on a machine with nonzero internal null pointers? internal representation generation, coding style
My vendor provides header files that #define NULL as 0L -
What is the NULL macro and how is it defined? 0 or ((void *)0)
NULL macro implementation in C - The macro NULL is an implementation-defined null pointer constant - Cast vs uncast 0 - C++ compatibility
Definitive historical reason of casting unadorned 0 to void* in NULL macro When was the NULL macro not 0? - definitive on casting to void* - C vs C++ - nullptr/nullptr_t -
Don’t use NULL – Jens Gustedt's Blog
definitive argument against NULL macro - Possible implementation of NULL macro - null pointer constant - NULL considered harmful - C vs C++ - NULL considered harmful - 0L - having type void * instead of char * would not matter when calling execl. Arguably it may not matter anyway, since C specified that char * and void * have the same internal representation and memory alignment - NULL as sentinel argument for variadic functions - ABI, calling conventions, breaking stack layout - arg slot - _null
c - Ways a program might detect whether NULL macro is defined with integer or pointer type? - Stack Overflow
c - Are there reasons to assign NULL instead of 0 to non-pointer variables? - nullptr

Pointer declaration in C - to void, null pointer values of each pointer type - free - strict aliasing - pointers to functions/objects - flat memory model/virtual address space -
Pointer (computer programming) - PAE 36 bit paging to 32 bits, paging - C Arrays indexing, pointer arithmetics, dereference - dangling/back pointers, wild branch - void * - function pointer - dynamic memory allocation malloc - Memory-mapped hardware embedded systems
Dereference operator - Wikipedia
c - access element of struct passed into a void* pointer - dereferencing
Address arithmetic - pointer
AMD64 = x86-64/Intel 64/EM64T/x64 - definitive
C - Why cast to uintptr_t vs char* when doing pointer arithmetic - portability - definitive - gcc extension void pointer arithmetic -
What happens when a casted pointer has an increment operator? definitive - rvalue, lvalue, temporary object - Only lvalues can be incremented - pointer internal representation
c - What is intptr_t,is it a type for integer or pointer? - Stack Overflow

Array_subtleties-Indexing

arrays - Why does the indexing start with zero in 'C'? - Stack Overflow
Why do array indexes start with 0 (zero) in many programming languages? - Quora
Why are zero-based arrays the norm? - Software Engineering Stack Exchange
Why do we use arrays instead of other data structures? - Stack Overflow
c++ - Accessing an array out of bounds gives no error, why? - Stack Overflow
c++ - Reverse iteration with an unsigned loop variable - Stack Overflow
c++ - When should I use std::size_t? - Stack Overflow
Wrap around explanation for signed and unsigned variables in C? - Stack Overflow
[cppx] How to avoid disastrous integer wrap-around | Alf on programming (mostly C++)
What is the "-->" operator in C++? - Stack Overflow
Array declaration in C- Array to Pointer implicit conversion - Multidimensional arrays - VLAs variable length arrays
What's so bad about VLAs Variable Length Arrays? : cpp
c - What's the point of VLA anyway? Variable Length Arrays
Variable-length array - VLAs
Can a const variable be used to declare the size of an array in C? VLAs Variable Length/Runtime Bounded Arrays - static const, constexpr
c - Is alloca() completely replaceable? - VLAs
Waiter! There's a VLA in my C!
Variable Length Arrays - VLAs - definitive standard specification
DEFINITIVE - Why aren't variable-length arrays VLAs part of the C++ standard? code safety - memory, stack alignement - std::vector custom stack allocator - alloca() - sizeof compile time/runtime - discussion, criticism

'memory-leaks' tag wiki - Stack Overflow
Memory Allocators 101 | James Golick
Memory allocation - Rosetta Code
c - Addressable memory unit - Software Engineering Stack Exchange
memory management - What and where are the stack and heap? - Stack Overflow
c++ - Which is faster: Stack allocation or Heap allocation - Stack Overflow
How is the memory layout of a C/C++ program? - Stack Overflow
Memory Layout of C Programs - environment variables - GeeksforGeeks
20 issues of porting C++ code to the 64-bit platform -- endianness, bitwise shifting, serialization, data alignment, data model
c++ - Stack Memory vs Heap Memory - Stack Overflow
Tagged pointer - Wikipedia
Segmentation fault - Wikipedia
address zero VS null pointer - Stack Overflow
c - Address of NULL pointer - Stack Overflow
c - NULL as a pointer valid address? (void*)0 - Undefined Behavior - Stack Overflow
In C, can an address of a pointer be 0? definitive answer - null pointer vs null pointer constant - Stack Overflow
c++ - Could I ever want to access the address zero? definitive answer - address 0 vs null pointer - how to assign address zero to a pointer without assigning null pointer constant - embedded devices, playstations kernel - Stack Overflow
c - What is the difference between NULL, '\0' and 0 - defintive answer - Stack Overflow
Why are NULL pointers defined differently in C and C++? 0, NULL, nullptr - Stack Overflow
c++ - What exactly is nullptr? - Stack Overflow
NULL in C++ - The macro NULL is an implementation-defined null pointer constant - cppreference.com
nullptr, the pointer literal - null pointer constant - cppreference.com
std::is_null_pointer - checks std::nulltptr_t - cppreference.com
std::nullptr_t - type of the null pointer literal/constant - cppreference.com
Is C NULL equal to C++11 nullptr - Stack Overflow
Understanding nullptr in C++ - GeeksforGeeks
c++ - What are the advantages of using nullptr over NULL? definitive answer on differences - Stack Overflow
Migrating from C to C++: NULL vs nullptr — Embedded Artistry
What's the difference between NULL and nullptr in C++? - Quora
c - void* will have the same representation and memory alignment as char* - interchangeability - Stack Overflow
c - Are there any platforms where pointers to different types have different sizes? - Stack Overflow
memory management - Why / when to use `intptr_t` for type-casting in C? C program portability - Stack Overflow

Strict_Aliasing

DEFINITIVE - Strict aliasing rule and 'char *' pointers - definition, discussion, optimization, criticism - lifetime, storage
casting - C++: Is it safe to cast from wchar_t* to unsigned short*? strict aliasing - Stack Overflow
DEFINITIVE - What is the strict aliasing rule? endiannes/byte order, alignment, structs packing
C++'s Strict Aliasing Rule - Is the 'char' aliasing exemption a 2-way street? - Stack Overflow
c++ - Does casting a char array to another type violate strict-aliasing rules? - Stack Overflow
c - gcc, strict-aliasing, and horror stories - Stack Overflow
c - When is char* safe for strict pointer aliasing? - Stack Overflow
What does the C ??!??! operator do? trigraph

Why it is important to check what the malloc function returned : C_Programming
Checking the return of malloc() for NULL is not currently considered good practice - secure coding
chasing a phantom: checking the return of malloc – Jens Gustedt's Blog
Secure Coding Best Practices for Memory Allocation in C and C++ - malloc, calloc
How to Allocate Dynamic Memory Safely - stack-based/heap-based memory management - RTOS memory parition - Multitasking memory management - Memory management libraries - memory pools - static memory allocation/preallocation -
c - What is the Best Practice for malloc? secure coding
c - When a program terminates what happens to the memory allocated using malloc that is not free'ed? - Stack Overflow
Do you generally abort execution when/if malloc returns NULL? - In library code - abort - Virtual Memory Overcommit
If malloc() fails to allocate the required memory, does it return? - Valgrind
If malloc fails, it's not for the obvious reason - vm.overcommit Virtual Memory
c - What if malloc fails? abort
c - Should I check if malloc() was successful? - Stack Overflow
Why it is important to check what the malloc function returned - Undefined Behavior, null pointer dereference
This is one of those "let's ignore malloc failing" bugs - Worse is Better
C how to handle malloc returning NULL? exit() or abort() - Stack Overflow
c - Why malloc memory in a function and free it outside is a bad idea? - Stack Overflow
c - Memory allocated with malloc does not persist outside function scope? Pass-by-value paradigm
Dynamic Memory Allocation and Fragmentation in C and C++ - malloc, free - Memory spaces, static/automatic/dynamic memory - Memory Fragmentation - with RTOS Real Time Operating System - Memory Leak Detection - Real Time Memory Solutions

Dynamic_Memory_Allocation

definitive - Handling out-of-memory OOM conditions in C - malloc returning null - xmalloc wrapper function, xalloc_die() - recovering/aborting/segfault policies - GLib, g_malloc, g_try_malloc, g_realloc - Best Current Practices with lighttpd, redis - Git version of xmalloc
How can I dynamically allocate a multidimensional array? malloc, free -
XMalloc: A Scalable Lock-free Dynamic Memory Allocator for Many-core Machines - SIMD processors/CPUs

C’s Memory Model - valgrind - malloc, xmalloc, xalloc, calloc, xcalloc - Undefined Behaviorv - read-only memory, .text - address of - stack allocation
Function pointer conversion to void * generic pointer
Dynamic array - Wikipedia
Out of memory - mmap
c - How does free know how much to free? - definitive visual explanation - information sotred in the allocated data block header - malloc, segmentation fault, undefined behavior
c - Array or Malloc? - VLAs - allocation failures
MEM02-C. Immediately cast the result of a memory allocation function call into a pointer to the allocated type - SEI CERT C Coding Standard - MEM02-C. Immediately cast the result of a memory allocation function call into a pointer to the allocated type - secure coding - malloc cast - definitive discussion in comments
mmap - Wikipedia
How do the brk and mmap system calls work in the Linux kernel? - Quora
c++ - mmap() vs. reading blocks - Stack Overflow
What is `mmap` in C?
Memory Mapped Files - i0exception - Medium

Calling_Conventions

How many arguments are passed in a function call? - Stack Overflow
Code Generation & Parameter Passing - calling conventions

Main_function

Is it mandatory to use "return" and "void" in the functions in C? - Stack Overflow
c++ - Difference between void main and int main? - signature
Entry point - Wikipedia
Difference between main(void) and main() in C - Stack Overflow
What should main() return in C and C++? Non-necessity of explicit return at the end of main - Omission of return statement - $? command in shell - main(void) vs main() -
c++ - Should I return EXIT_SUCCESS or 0 from main()? - Stack Overflow
c++ - Must the int main() function return a value in all compilers? C++, C99/C11 vs C89
Why would you precede the main() function in C with a data type? - Stack Overflow
Where are C/C++ main function's parameters? Program Startup, main arguments argc, argv - - Stack Overflow
c++ - Why do we need argc while there is always a null at the end of argv? argv[argc] = NULL - Stack Overflow
Command line arguments in C, cant understand its behaviour - Undefined Behavior argv, argc - crt0 - Stack Overflow
What are the valid signatures for C's main() function? int main() vs int main(void) in C vs C++ - Stack Overflow
Linux x86 Program Start Up - before and after main function - _start(), __libc_start_main(), __libc_csu_init(), __gmon_start__(), diagram of program start up execution from loader to main - environment variables - definitive visual explanation
What the reasons for/against returning 0 from main in ISO C++? - Stack Overflow
c++ - What was the rationale for making `return 0` at the end of `main` optional? - Stack Overflow
void main(void) - the Wrong Thing - main function signature - definitive arguments, assembly code
Main function in C - hosted vs freestanding environment - cppreference.com
c - Difference between int main() and int main(void)? declaration vs definition - f() vs f(void)

Format_Strings

scanf format string - Wikipedia
printf format string - Format placeholder specification : syntax %[parameter][flags][width][.precision][length]type - platform-independant conversion specifiers macros - vulnerability, attack -Wikipedia
Platform independent size_t Format specifiers in c? - Length modifiers - Stack Overflow
What is %p in the printf function in C programming language? - Quora
c++ - Where is `%p` useful with printf? - Stack Overflow
c - How do format specifiers work internally? - Stack Overflow
c++ - Why does printf not print out just one byte when printing hex? undefined behavior - Stack Overflow
C/C++ function definitions without assembly - Stack Overflow
C - scanf, fscanf, sscanf, scanf_s, fscanf_s, sscanf_s - cppreference.com
c - printf("%p") and casting to (void *) - Stack Overflow
C - printf, fprintf, sprintf, snprintf, printf_s, fprintf_s, sprintf_s, snprintf_s - cppreference.com
C++ - std::printf, std::fprintf, std::sprintf, std::snprintf - cppreference.com

Variadic_Functions

Technically, how do variadic functions work? How does printf work? implementation details - Stack Overflow
Why does a function with no parameters (compared to the actual function definition) compile? - Stack Overflow
Access to variadic function' arguments without va_list in C - Stack Overflow
An example of use of varargs in C - Stack Overflow
What is the format of the x86_64 va_list structure? - Stack Overflow
c - Correct format specifier to print pointer or address? Need for cast to void pointer in variadic function - - Stack Overflow
The GNU C Library - Variadic functions - C Language Facilities in the Library
Variadic function - Wikipedia
c - %p format specifier needs explicit cast to void* for all types but char* in printf - argument interchangeability - representation, alignment
c - Argument conversion: (normal) pointer to void pointer, cast needed? printf %p format specifier - definitive answer with quotes from standard - variadic functions conversion rules - default argument promotion - ellipsis notation
c - When printf an address of a variable with %p, why use void*? no implicit conversion to void* in variadic function, as there is no declaraed parameter - definitive answer - pointer arithmetics - cast pointer to int drawbacks, pointers substraction - pointer size/representation by C standard - (u)uintptr_t - pointer vs number - Cray T90
Variadic functions in C++ - cppreference.com
Variadic functions in C - cppreference.com
Variadic arguments in C - cppreference.com
c - Why cast is needed in printf? variadic function and type casting requirement vs non-variadic function - definitve answer - Stack Overflow

Types

Understanding_C_Declarations

DEFINITIVE - Clockwise/Spiral Rule - cdecl - making sense of c expression declaration - signal function meaning, interpretation
Reading C type declarations
Spiral rule and 'declaration follows usage' for parsing C and C++ declarations - Stack Overflow
DEFINITIVE - Understanding typedefs for function pointers in C - signal function, handler -
object oriented - Can a C struct behave like it had a function? - Object Oriented Simulation in C - member function
Can I define a function inside a C structure? Object Oriented Simulation in C - member functions
Interpreting More Complex Declarators | cdecl - C Declarations
c++ - Typedef function pointer? - Stack Overflow

Object_qualification_const-ness-volatile

c++ - What is the difference between const int*, const int * const, and int const *? - Stack Overflow
Const Correctness, C++ FAQ
c++ - Const before or const after? - Stack Overflow
Const Correctness, C++ FAQ
const (computer programming) - Wikipedia, the free encyclopedia
c++ - Easy rule to read complicated const declarations? - Stack Overflow
C++: const reference, before vs after type-specifier - Stack Overflow
volatile type qualifier in C - cppreference.com
Const correctness in C vs C++ -
const (computer programming) - C vs C++ - definitive
c++ - const vs constexpr on variables - Stack Overflow
c++ - Difference between `constexpr` and `const` - Stack Overflow
Demystifying constexpr
constexpr specifier (since C++11) - cppreference.com
4.13 — Const, constexpr, and symbolic constants | Learn C++
Understanding constexpr specifier in C++ - GeeksforGeeks
newbie question: c++ const to non-const conversion - value vs reference/pointer

Declarations-Definitions-Storage_Duration_Specifier

Difference between static in C and static in C++?? - Stack Overflow
Static functions in C - GeeksforGeeks
What is the difference between static and extern in C? - Stack Overflow
When to put static function definitions in header files in C? - Stack Overflow
What is the deep difference between static & extern declaration in C/C++ programming? - Quora
Static Variables in C - GeeksforGeeks
Static (keyword) - Wikipedia
syntax - What does "static" mean in C? vs C++ - Stack Overflow
function pointers - static vs extern "C"/"C++" - Stack Overflow
variable declaration - When to use extern in C++ - Stack Overflow
Understanding "extern" keyword in C - GeeksforGeeks
How to correctly use the extern keyword in C - definitive explanation - errno implementation example in stdio.h
What is the lifetime of class static variables in C++? - Stack Overflow
Finding C++ static initialization order problems - Stack Overflow
c - static declaration of m follows non-static declaration - vs extern - Stack Overflow
C/C++ global vs static global - Stack Overflow
Storage class specifiers in C++ - static, extern, thread_local, mutable - storage duration - no/internal/external linkage - construction/destruction time - cppreference.com
Storage-class specifiers in C - storage duration : automatic, static, thread, allocated/dynamic - keywords auto, register, static, extern - linkage type : no linkage/internal/external linkage - file-scope/global variable - life time
Static variable - .bss, . data - Wikipedia
Thread-local storage - static/global memory local to a thread - errno
Finding C++ static initialization order problems - Stack Overflow
c - Static vs global - internal/external linkage - Stack Overflow
cv (const and volatile) type qualifiers in C++ - cppreference.com
c - How to print value of global variable and local variable having same name? - Stack Overflow
scope - How can I access a shadowed global variable in C? extern/static - Stack Overflow
inline function specifier in C - cppreference.com
c - Static const variable declaration in a header file - translation unit is the individual source file - Stack Overflow
Internal Linkage and External Linkage in C - GeeksforGeeks
c - extern declaration and function definition both in the same file - multiple declarations allowed but only one definition - Stack Overflow
c - Can local and register variables be declared extern? definitive about scope of extern local/variable variables - Stack Overflow
c - Usage of extern in the same file - definitive global/local extern variables explanation - access shadowed global variable
DEFINITIVE - Why are some functions declared extern and header file not included in source in Git source code? definitive in-depth explanation extern/static functions/variables -
DEFINITIVE - Why are global and static variables initialized to their default values? Security - static/auto storage class - Stack Overflow
What is the lifetime of a static variable in a C++ function? storage duration - Stack Overflow
Static variables in C++ - file-scope static variable defined in header
c - How do I use extern to share variables between source files? definitive explanation on extern keyword - Golden Rules about using global variables with extern/static keywords - SPOT Single Point of Truth - Header Guards, Variable Initialization - Avoiding Code Duplication - declaration vs definition
Declarations and Initializations - extern, auto, static
External variable - extern keyword - static - declaration vs definition - lifetime, scope
static and extern global variables in C and C++ -
Lifetime in C - of dynamically allocated objects - vs storage duration - temporary lifetime
Scope in C - file/block/function scopes - linkage, storage duration
c - Global variables in header file - tentative definition
c++ - Are global variables extern by default or is it equivalent to declaring variable with extern in global? file-scope vs static vs extern - storage duration, internal/external linkage
Global variables in C are static or not? - Stack Overflow
What is the difference between an extern variable and global variable in C? - Quora
c - About Tentative definition - full definition - pure declaration with extern
compilation - Tentative definitions in C and linking
variables - What is the rationale behind tentative definitions in C? - backwards compatibility with pre-C89
c - External definition for identifier with internal linkage - external definition (outside function scope at file-scope) vs extern variable
C vs C++ default global variable linkage, multiple declaration & definition problem - tentative - definitive - standard extension
standards - Why a variable can't be defined twice in 2 files in C - tentative definitions, declaration, intern/extern linkage - definitive quotes from standard
Tentative definitions - internal/external linkage
Krister Walfridsson’s blog: Tentative variable definitions, and -fno-common - GCC optimization - x86, ARM
Linkage - global/local - external/internal - extern, static, auto storage-class specifiers
Tentative Definitions - internal/external linkage - static/ extern storageclass specifier
Declarations in C- VLAs
c++ - "extern" inside a function? - accessing shadowed file-scope external variables
c++ - Where in a declaration may a storage class specifier be placed? - Stack Overflow
c - GCC: why constant variables not placed in .rodata - static, bss, data segments
Automatic variable - storage duration -
What is a "static" function in C? - Stack Overflow
What is a static function in C? - Quora
Lifetime in C++ - storage
Are file-scope `static` variables in C as bad as `extern` global variables? - definitive - lifetime - vs class static member - thread safety, data encapsulation - test - dependency inversion principle
c - Why does GCC not assign the static variable when it is initialized to 0 - Stack Overflow
DEFINITIVE - Why are static variables auto-initialized to zero? .bss- loading process, loader - K&R Kernighan&Ritchie1 (Appendix A, §6.8) - Static and external variables which are not initialized are guaranteed to start off as 0; automatic and register variables which are not initialized are guaranteed to start off as garbage - ELF - C Startup code
DEFINITIVE - External and tentative definitions, pure declaration with extern - one definition rule - external vs extern keyword - full/actual definition with initializer - definitive - global variable is external variable with external linkage

Pitfalls in C and C++: Unsigned types | Sound Software .ac.uk
C data types - Format specifiers - Fixed-width integer types - Wikipedia
c++ - Why data type is needed in pointer declaration? - Stack Overflow
c - Why type cast a void pointer? - Stack Overflow
C - when is casting void pointer needed? - Stack Overflow
c - why is this casting to void pointer valid? - Stack Overflow
c - What type for subtracting 2 size_t's? - Stack Overflow
integer literal - decimal-literal, octal-literal with prefix 0, hex-literal with prefix 0x, binary-literal with prefix 0b/0B - Integer suffixes as u/U for unsigned integer, l/L for long integer and ll/LL for long long - cppreference.com
Fundamental types in C++ - Data Model LP32/LLP64, ILP32/LP64 - void type - complete/incomplete types - Range of values - cppreference.com
Fundamental Arithmetic types in C - Data Model LP32/LLP64, ILP32/LP64 -date model width - range of values - wchar_t, char16/32_t - _Bool
Type system overview in C++ - compatible types - complete/incomplete types - cppreference.com
Implicit conversions in C++ - integer promotion - cppreference.com
Fixed width integer types (since C++11) - include <cstdint> header - integer limits - cppreference.com
Fixed width integer types (since C99) - stdint.h - inttypes.h header - Format macro constants - fprintf/fscanf conversion specifier - (u)intptr_t - platform-independant conversion specifiers macros - integer limits - uint8_t, uint32_t, uint16_t
std::ptrdiff_t in C++ - defined in cstddef - pointer arithmetics - cppreference.com
ptrdiff_t in C - defined in stddef.h - pointer arithmetics - PTRDIFF_MAX, SIZE_MAX, INT_MAX - signed counterpart of size_t, equivalent/synonyme to intptr_t
c - size_t vs. uintptr_t - segmented memory architecture - embedded systems - internal representation, bit pattern
c - What is intptr_t,is it a type for integer or pointer? uintptr_t - pointe to void - void *
c - void * arithmetic - void type, GCC extensions - -Wpointer-arith - Stack Overflow
Pointer arithmetics - void type, GCC extensions, sizeof(void) = 1 - void * -Wpointer-arith

Aggregates_and_POD

What are Aggregates and PODs and how/why are they special? - Stack Overflow
What are POD types in C++? - Stack Overflow
c++ - trivial vs. standard layout vs. POD - Stack Overflow

compound literals - unnamed object
Function declaration in C++ - parameter list - void paramater - cppreference.com
Is there a difference between foo(void) and foo() in C++ or C? - Stack Overflow
c - func() vs func(void) in c99 - parameter - Stack Overflow
c++ - What does casting to `void` really do? - Stack Overflow
c - Why cast an unused function parameter value to void? - Stack Overflow
Typecasting - C
Type support - Additional basic types and convenience macros in stddef.h - size_t, ptrdiff_t, NULL, max_align_t, offsetof, alignas, alignof - - cppreference.com
Numeric limits in C - limits.h/stdint.h/float.h - CHAR_BIT - SIZE_MAX - PTRDIFF_MIN/MAX - INT_MAX/MIN
size_t - ssize_t defined in sys/types.h - unsigned integer type of the result of sizeof , alignof (since C11) and offsetof, depending on the data model
c - How can I convert to size_t from int safely? - Stack Overflow
Wide character - wchar_t vs char32_t - Wikipedia
Function declarations in C - f() vs f(void) difference until C2x (obsolete) - Undefined Behavior - without prototype - vs definition - typedef function - default arguments/integer promotion
Implicit conversions in C - arithmetic conversion rules - default integer promotion function without prototype and variadic function's trailing argument matched against ellipsis - signedness conversion - three exception arrau to pointer decay - pointer conversion to and from void* - definitive null pointer constant zero 0 VS NULL macro equivalence - Signed integer conversion implementation defined - array to pointer decay with three exceptions, address of array - no implicit conversion between integer and pointer - integer overflow - integer type rank - Function to pointer conversion -
Not casting pointers in C can cause problems? implicit conversion - definitive answer on internal pointe representation - pointer to char (char*) interchangeability with pointer to void (void*) - Language does not support implicit conversions between incompatible pointer types
Why does C need "struct" keyword and not C++? - Stack Overflow
INT36-C. Converting a pointer to integer or integer to pointer - SEI CERT C Secure Coding Standard - uintptr_t
c - What is the motivation for casting a pointer into a integer? uintptr_t, intptr_t, usecase - pointer hash code computation - user-space to kernel-space transmission via syscalls arguments - GCC extensions __attribute__, builtin
rsize_t type - synonym to size_t - secure coding
DEFINITIVE - About size_t and ptrdiff_t - size_t and uintptr_t are synonyms - ptrdiff_t and intptr_t are synonyms - safety, secure coding, performance
size_t - vs uinptr_t - definitive
c++ - Why is rsize_t defined? C11, Annex K - deprecated - definitive rationale explanation - secure coding - secure std functions - RSIZE_MAX - vs size_t - two's complement
c - Is a conversion to `void *` required before converting a pointer to `uintptr_t` and vice versa? internal representation pointers, bit pattern
c++ - unsigned int vs. size_t - Stack Overflow
c++ - Should I use std::size_t or int in my for loops? - Stack Overflow
int - What is size_t in C? - Stack Overflow
c++ - Difference between size_t and std::size_t - Stack Overflow
c++ - Why is size_t unsigned? - Stack Overflow
c++ - should use size_t or ssize_t - ssize_t is not included in C standard but in POSIX interface - ptrdiff_t - SSIZE_MAX
c++ - Cast ssize_t or size_t - Stack Overflow
c++ - why is sizeof(ptrdiff_t) == sizeof(uintptr_t) - SIZE_MAX - PTRDIFF_MAX
What is the maximum size of an array in C? SIZE_MAX, size_t - PTRDIFF_MAX - 32-bit vs 64-bit
size t - Does "std::size_t" make sense in C++? - Stack Overflow
c++ - What's the real size of `size_t`, `uintptr_t`, `intptr_t` and `ptrdiff_t` type on 16-bit systems using segmented addressing mode? - Stack Overflow
Signed and Unsigned Types in Interfaces - scott meyers
What is the unsigned counterpart of ptrdiff_t? unsigned counterpart of ptrdiff_t - contradicts en.cppreference.com/w/c/types/ptrdiff_t - ssize_t signed counterpart of size_t
How to correctly cast a pointer to int in a 64-bit application? SILP64, LP64, LLP64 data models - 32 vs 64-bit - intptr_t, size_t, INT_PTR
LP64 (I32LP64) Data Model
LLP64 (ILP32LLP64, P64)
Memsize-type - pointers, size_t, ptrdiff_t, intptr_t, SIZE_T, DWORD_PTR
ptrdiff_t - synonym to intptr_t
cast operator in C - explicit conversion - (void)
C10k problem - ten thousands connections - Network/Socket Programming - NginX
Bit fields in C - padding
Difference between _Bool and bool types in C? - Stack Overflow
DEFINITIVE - What is the difference between scalar types and aggregate types in C? Arithmetic types and pointer types are collectively called scalar types. Array and structure types are collectively called aggregate types -
terminology - What does it mean when data is scalar? type
Type system overview in C - compatible types - complete/incomplete - C vs C++ difference - types groups, objects, characters, integers, real, arithmetic, scalar, aggregate, derived declarator
POSIX <sys/types.h> - ssize_t definition - SSIZE_MAX
13575 – SSIZE_MAX defined as LONG_MAX is inconsistent with ssize_t, when __WORDSIZE != 64
POSIX <limits.h>
General Limits (The GNU C Library) - ssize_t SSIZE_MAX
c - Will write(2) always write less than or equal to SSIZE_MAX? - _POSIX_SSIZE_MAX - EINVAL
Function definitions in C - default argument/integer promotion - __func__, __line__ predefined macros constants
Is it better to use C void arguments "void foo(void)" or not "void foo()"? f() vs f(void)
parameters - main function in C with void and without void - f() vs f(void)
Function prototype/interface - Wikipedia
c++ - Is the return type part of the function signature? specialization of function templates
history - Why did C have the return type before functions? signatures
c++ - why is sizeof(ptrdiff_t) == sizeof(uintptr_t) - Stack Overflow

Operators_Properties

Bitwise_operations

bit manipulation - XOR operator in C - Stack Overflow
c - What is Bit Masking? - Stack Overflow
What is a bitmask and a mask? - Stack Overflow
Index of file:///media/programmersn/NOUAIM/Studies/Documentation/Computer_science/Software_development/Programming/Paradigms_and_methods/Generalities/Progamming_generalities/bitwise_operations/
Bitwise operations in C - Wikipedia, the free encyclopedia
difference bitwise and and logical and c at DuckDuckGo
What are the differences between bitwise and logical AND operators in C/C++? - GeeksforGeeks
bitwise operators - Difference between & and && in C? - Stack ...
proof - How to prove that the C statement -x, ~x+1, and ~(x-1) yield the same results? - Stack Overflow
c++ - Is there any advantage to c-style bit manipulation over std::bitset? - SWAR (SIMD within a register) - bitwise
C++ bitset implementation - Code Review Stack Exchange
GitHub - drali/BitSet: A faster bitset implementation than gcc's std::bitset
Understanding this bitset implementation (C++) - Stack Overflow
std::bitset - cppreference.com
std::bitset<N>::bitset - cppreference.com
C++ bitset and its application - GeeksforGeeks
C++ Bitset With Example | Owlcation
Compressed bitset libraries in C and C++ – Daniel Lemire's blog
std::vector<bool> - possibly space-efficient specialization of std::vector for the type bool - dynamic equivalent to bitset

C Operator Precedence - cppreference.com
Arithmetic operators - C language - conversion/typecasting one operand - handling of mixed sign operands - integer overflows - bitwise shift operations - Integer promotion - definitive explanation on pointer arithmetics - ptrdiff_t - usinged integer overflows - modulo arithmetic - floating point
Arithmetic operators - Cpp language - conversion/typecasting one operand - hadnling of mixed sign operands - integer overflows - bitwise shift operations - Integer promotion - pointer arithmetics, ptrdiff_t - definitive explanation on pointer arithmetics - cppreference.com
Subscript Operator [] | Microsoft Docs
?: - Ternary Operator - conditional operator, inline if (iif), or ternary if - C vs C++ - Elvis Operator
Operators in C and C++ - precedence - arithmetic, comparison, logical, bitwise -
Comma operator - Wikipedia
Is there a performance difference between i++ and ++i in C vs C++? definitive - postfix/prefix increment operator
Is there a performance difference between i++ and ++i in C++? postfix/prefix increment operator implementation
c++ - Why does the postfix increment operator take a dummy parameter? prefix - signature
c++ - STL iterators: Prefix increment faster? - Stack Overflow
gcc - What is "!!" in C? - Stack Overflow
stupefy developer: c: double exclamation - used in linux kernel code
Assignment operators - cppreference.com
Associative property - left/right associativity - right-to-left/left-to-right - non associative operators
Operator associativity - non associative, right/left associative operators - Right-associativity of assignment operators
Initialization in C - storage duration, static/thread local, automatic
Other operators in C - function call - without prototype - default arguments/integer promotion - undefined behavior - function to pointer implicit conversion/chained dereferencing, function designator - printf, trailing ellipsis - conditional, comma operator - interchangeability between pointer to void (void *) and pointer to char (char *)

Order_of_Evaluations-Sequencing

Order of evaluation in C - sequencing, sequence points - undefined behavior - increment operator - side effects
c++ - Undefined behavior and sequence points - Stack Overflow
C++ Core Guidelines: Rules for Expressions - precedence
How does the post increment operator work in GNU C? valgrind, fsanitize - i=i++ undefined behavior - Software Engineering Stack Exchange
Sequence point - sequencing, order of evaluation - definitive - i=i++ increment operator - Undefined Behavior - side effects - race conditions, multithreading
c - Why are these constructs using pre and post-increment undefined behavior? i=i++ Undefined and Unspecified Behavior - Stack Overflow
Concurrent computing - Wikipedia
Order of operations - precedence - Programming languages - operators

Strings_Properties

Null character - NUL - null byte - null terminated string/string terminator - null byte injection - security exploits - represented in escape sequences with prefixes with \ \x or \u - \z
c - Using printf with a non-null terminated string - Stack Overflow
c - How do I print a non-null-terminated string using printf? - Stack Overflow
c++ - Defining a string with no null terminating char(\0) at the end - Stack Overflow
Character literal - Wikipedia
Why are strings in C++ usually terminated with '\0'? null byte, null character, NUL, string terminator - strncpy, strlcpy, strcpy_s - Stack Overflow
Null-terminated string - NUL, null byte, string terminator- strlcpy, gets, strdup - Wikipedia
Escape character - Wikipedia
programming languages - What does backslash "\" escape character really escape? - Software Engineering Stack Exchange
std::strcmp in C++ - cppreference.com
strcmp in C - cppreference.com
strncmp in C - cppreference.com
Null-terminated byte strings - terminating null character, NUL, null byte, string terminator - cppreference.com
string literals in C - null character/byte appended at translation phase 7 - phase 6 concatenation - read only memory .rodata
String literal - escape sequences - concatenation - stringification macros
Escape sequences in C - \x, \n prefixes - hex escape sequence
Escape sequences in C++ - \x prefix - cppreference.com
Escape sequences in C - \x prefix - cppreference.com
Null-terminated wide strings - cppreference.com
c++ - wchar ends with single null byte or two of them? null terminated wide string - null wide character terminator
String literals initialization in array vs pointer - read-only memory
string literal in c++ - null character/byte appended - cppreference.com
C string handling - Character encodings, Unicode, UTF-8/16/32 - wchar_t - non-ASCII characters prefixed with \x for each byte of UTF-8 and with \u prefix for each word of UTF-16 - wchar_t, wint_t, NULL - string manipulation functions strcpy, strncpy, strlcpy, security/secure strcpy_s, strcat - memory manipulation memset, memcpy, memmove, memcmp, memchr
Rules for C++ string literals escape character - Stack Overflow
std::isalpha in C++ - setlocale - ISO-8859-1 extended ASCII
DEFINITIVE - memory - Why are C string literals read-only? - code .text segment, undefined behavior UB - MMU, mmap - functionnal programming

Signals_And_Callbacks

timers vs thread kernel at DuckDuckGo
C signal handling - Wikipedia
c++ - Why are signals and slots better than plain old callbacks? - Stack Overflow
c - difference between signal, software interrupt, and hardware interrupt? - Stack Overflow
a_deeper_look_at_signals_and_slots.pdf

Preprocessor_Instructions

http://www.agner.org/optimize/calling_conventions.pdf

Conversion_Functions

c - atoi vs atol vs strtol vs strtoul vs sscanf - definitive comparison - Stack Overflow
atoi vs strtol? gets, deprecated functions : cpp_questions
strtol, strtoll - cppreference.com
atoi, atol, atoll - cppreference.com
Passing NULL to atoi() Function results in Segmentation Fault - C / C++

Language linkage - extern "C" - cppreference.com
C/C++ Rarer keywords - register, volatile, extern, explicit - Stack Overflow
c - What is the difference between a definition and a declaration? definitive - a declaration is a definition except for some cases - One Definition Rule

Process_Handling

c - What is the difference between using _exit() & exit() in a conventional Linux fork-exec? - Stack Overflow
std::_Exit in C++
std::abort in C++
_Exit in C
abort in C
exit in C
c++ - What is the difference between exit() and abort()? - Stack Overflow
c++ - abort, terminate or exit? - Stack Overflow
c - how to exit a child process - _exit() vs. exit - Stack Overflow
c - How does the fork() know whether it is in child process and in parent process? - Stack Overflow
Fork–exec - child process
Spawn (computing) - vs fork-exec - CreateProcess API
c - fork() returns 0, but the child process getpid()!=0. Why? getpid, getppid - definitive
linux - Why fork() return 0 in the child process? - Stack Overflow
programming - Where does fork() actually start? - definitive
c - How does fork system call really works - process scheduling, run queue -
The fork() System Call - how it works internally
quick_exit - cppreference.com
atexit - cppreference.com
kill - Default exit code when process is terminated? exit value meaning - 128+n if command process terminated by signal n
vfork() - Unix, Linux System Call - Tutorialspoint
vfork() — Create a new process - #include <sys/types.h> #include <unistd.h> headers
linux - Why is vfork() intended to be used when the child process calls exec() or exit() immediately after creation? - Unix & Linux Stack Exchange - exit(), _exit(), posix_spawn(), execve()
Learn and use fork(), vfork(), wait() and exec() system calls across Linux Systems - visual explanation
c - What is the difference between fork() and vfork()? - copy on write - risks, dangers
c - How does fork() work? - definitive visual explanation - Copy On Write COW, open(), dup2()
C process control - abort(), exit(), _Exit(), atexit(), quick_exit(), at_quick_exit(), getenv(), system() - definitive list of C lib functions

Isn't #defining TRUE to be 1 dangerous, since any nonzero value is considered ``true'' in C? What if a built-in logical or relational operator ``returns'' something other than 1?
Order of evaluation in C++ - sequence points, sequencing - undefined behavior

References

Tenouk index for on C++, C, STL, Win32, MFC, Winsock, Linux Socket, Buffer Overflow tutorials
C and C++ complete reference, based on languages standards

How to Make If Statements More Understandable - Fluent C++
C/C++ for Hackers « Null Byte :: WonderHowTo
Formal verification of C/C++ code for critical systems
Compatibility of C and C++ - Wikipedia

Rust

Rust is self driving C++ – Robert Grosse – Medium
Barely Functional
Writing a CHIP-8 emulator with Rust and WebAssembly
Oxidizing Source Maps with Rust and WebAssembly – Mozilla Hacks – the Web developer blog
GitHub - hackndev/zinc: The bare metal stack for rust

dotNET

What is the difference between the Common Language Runtime (CRT) and Windows Runtime (WinRT)?
CLR Journey from PInvoke to WinRT - CodeProject
What is the difference between WinRT, UWP (Universal Windows Platform) and WPF? - Software Development - Stopbyte
CLR, Win32, WinRT in Windows architecture - Stack Overflow

C-sharp

Delegates-Events

Delegate (CLI) - Wikipedia
.net - Are delegates and callbacks the same or similar? - Stack Overflow
Combining the Advantages of Qt Signal/Slots and C# Delegates/Events | blogs.kde.org

C# BAD PRACTICES: Learn how to make a good code by bad example – Part 4 - CodeProject
Uploading Files to AWS - DZone Cloud
Serialization (C#) | Microsoft Docs

Adding a New Bytecode Instruction to the CLR - CodeProject
How to Hash Passwords in PHP in a Modern way - Coding Security
iOS UI Tools vs. Microsoft UI Tools
The CLR Thread Pool 'Thread Injection' Algorithm - CodeProject
Plateforme .Net : le ramasse-miettes

Java

Signal_Handling

Handle Signals and Exceptions

java - What is object serialization? - Stack Overflow
java - When would I want to make my private class static? - inner class
Can a static nested class be instantiated in Java? - inner class - vs C++

Python

boost python (C++ Boost) at DuckDuckGo
IntegratedDevelopmentEnvironments - Python Wiki
The Python Tutorial — Python 3.6.3 documentation
Python2orPython3 - Python Wiki
3 mistakes to avoid when learning to code in Python | Opensource.com
Teaching Python and more with open educational resources | Opensource.com
How do you distribute python apps - Coding Security
7 Best Python Books To Learn Programming » TechWorm
Simplifying Offline Python Deployments With Docker – Real Python
opensource.com/article/18/1/parsing-html-python?sc_cid=7016000000127ECAAY
Python Tutorial
An introduction to Python bytecode | Opensource.com
I Made a News Scraper with 100 Lines of Python. – Hacker Noon
3 practical Python tools: magic methods, iterators and generators, and method magic | Opensource.com
Python Debugging With Pdb – Real Python
python - What is the difference between venv, pyvenv, pyenv, virtualenv, virtualenvwrapper, pipenv, etc? - Stack Overflow
python - What is the purpose of self? - Stack Overflow
correct way to define class variables in Python - Stack Overflow
pep8 Pyhton Style Guide at DuckDuckGo

Swift

Start Developing iOS Apps (Swift): Build a Basic UI
The Swift Programming Language (Swift 4): Access Control
Swift.org - API Design Guidelines
Value and Reference Types - Swift Blog - Apple Developer
GitHub - raywenderlich/swift-style-guide: The official Swift style guide for raywenderlich.com.
A Better Way to Organize Swift Classes - License to Kill -9
What’s New in Swift 4?
What is an optional value in Swift? - Stack Overflow
The Implicitly Unwrapped Optional & When To Use It — KrakenDev
Mobile_Development - YouTube - YouTube
Timer - Foundation | Apple Developer Documentation
How to make an action repeat using Timer - free Swift 4 example code
Fastest, leanest way to append characters to form a string in Swift - Stack Overflow
Static function variables in Swift - Stack Overflow
How to tell Xcode where my info.plist and .pch files are - Stack Overflow
swift3 - Getter inside setter in Swift 3 - Stack Overflow
The Swift Programming Language (Swift 4): Type Casting
as keyword swift - Google Search
swift - What's the difference between "as?", "as!", and "as"? - Stack Overflow
Difference between 'is' and 'as' keyword in swift - Stack Overflow
Swift 3.0 - as, as?, as! and is operators. Downcasting and upcasting
c++ 11 instanceof - Google Search
Swift Programming: Info and Tutorials
Kotlin vs. Swift: Are Android and iOS moving towards creating a universal language?
Why we’re writing our website in Swift – Hackers at Cambridge – Medium
GitHub - fastred/Optimizing-Swift-Build-Times: Collection of advice on optimizing compile times of Swift projects.
Secure Coding in Swift 4
Deploying Swift to Ubuntu – Dimitry Z – Medium
Swift-ObjC API Exchange and NSTouchBar – Podcast S07 E04
Apple's Swift language finds its way into Google's secret Fuchsia OS
Why Google forked Apple's programming language Swift, according to Google
A C# developer learns Swift Part 1: Core Data - SEP Blog
Swift for the Java Guy Part 1: Getting Started - DZone Java

Ruby

Answer - Quora

Ruby_programming_language

bundler vs RVM vs gems vs RubyGems vs gemsets vs system ruby - Stack Overflow
Index of Classes & Methods in drb: Ruby Standard Library Documentation (Ruby 2.4.2)

Ruby_on_Rails

Ruby on Rails Guides
13 Reasons You Should Learn Ruby on Rails

Create a Linux desktop application with Ruby | Opensource.com

OCaml

Ocaml / functional programming · GitHub

PHP

Go

Using Go for Scalable Operating System Analytics – Kolide
7 stages of becoming a Go programmer | Opensource.com

D

5 reasons the D programming language is a great choice for development | Opensource.com

JavaScript

JavaScript Code Refactoring - CodeProject
A perfect guide for cracking a JavaScript interview (A developer’s perspective)
OK, Now I'll learn How To Program In JavaScript! – Fagner Brack – Medium
node.js - Differences between socket.io and websockets - Stack Overflow

WebAssembly

WebAssembly support now shipping in all major browsers - The Mozilla Blog
Leaning Technologies Blog: Cheerp (C++ to WebAssembly) 2.0RC1 released: as fast as Emscripten, 30-90% smaller output, mixed WebAssembly-JavaScript mode
All Major Browsers Now Support WebAssembly
Cheerp Tutorial: Mixed mode C++ to WebAssembly and JavaScript · leaningtech/cheerp-meta Wiki · GitHub
Introduction to WebAssembly: why should we care? - Federico Tomassetti - Software Architect
Making WebAssembly even faster: Firefox’s new streaming and tiering compiler – Mozilla Hacks – the Web developer blog
Creating WebAssembly-powered library for modern web
Analyzing WebAssembly binaries | Forcepoint

CSS

How To Animate Using CSS – codeburst
A complete cheatsheet for CSS(cascading style sheet) - Coding Security
Why SASS is better than LESS PreProcessor - Coding Security
CSS Naming Conventions that Will Save You Hours of Debugging

PHP

Languages_Comparison

Why Are Some Programming Languages Faster Than Others?
The Observation Deck » The relative performance of C and Rust
Comparison_between_some_languages.dvi
Ten interesting features from various modern languages
How slow is python when compared to c programming - Coding Security
Comparison of programming languages - Wikipedia

An Infographic to let your learn programming from scratch
An interesting programming feature that almost no language has
Rosetta Code - Equivalent tasks implementations with different languages
Open Standards for Programming Languages Implementations

Software_Architecture

Code_Design

Design_Patterns

Singletons

Singletons: Solving problems you didn’t know you never had since 1995 | Onelib
So Singletons are bad, then what? - Software Engineering Stack Exchange
Thread-Safe Initialization of a Singleton - ModernesCpp.com
Singleton
Singleton I love you, but you're bringing me down (re-uploaded)
Singletons are Pathological Liars
singleton-considered-stupid - steveyegge2
Patterns I Hate #1: Singleton
c++ - Memory leaks when using a singleton - Stack Overflow
c++ - Singleton instance declared as static variable of GetInstance method, is it thread-safe? - Stack Overflow
c++ - Singleton: is there a memory leak? - Stack Overflow

work stealing pattern at DuckDuckGo
Observer pattern - Wikipedia

Event-driven_programming

Event-driven programming - Wikipedia
Signal programming - Wikipedia
Dataflow - Wikipedia
Dataflow programming - Wikipedia

Coding_Standards

Thoughts from reading: The Clean Code • tracing bytes
clean code robert c. martin at DuckDuckGo

SOLID_Principles

Difference between Dependency Injection (one of multiple implementations of Inversion of Control principle) and Dependency Inversion Principle - definitive breakdown with code examples - Stack Overflow
c# - Solid Principle examples anywhere? Dependency Inversion Principle - Stack Overflow

Your Code Can Smell! How to Fix It
The Atoms of Programming
Are Programmers Headed Toward Another Bursting Bubble?
Managing software complexity through intent-based programming | TechCrunch
Software is Increasingly Complex. That Can Be Dangerous. - ExtremeTech
Simplistic programming is underrated – Daniel Lemire's blog
Choose one: High productivity or code you can maintain | InfoWorld
Modularization Isn’t Just About Code - CodeProject
The principle of least astonishment (POLA), also called the principle of least surprise - Wikipedia
PostSharp Blog | Aspect-Oriented Programming vs Dependency Injection
Why choose DI interception over aspect oriented programming? decorator pattern similarity
AOP vs decorator | Cross Cutting Concerns
c# - Logging as a decorator vs. Dependency Injection - what if I need to log inside the class? - Stack Overflow
Aspect (computer programming) - logging - Wikipedia
Cross-cutting concern - logging - Wikipedia
Aspect-oriented programming - logging- Wikipedia
Core concern - logging - Wikipedia
Separation of concerns - SoC - Aspect/Subject orirented programming, Wikipedia
Aspect-oriented software development - cross-cutting concerns - Wikipedia
What are some dead giveaways that someone is a 10X software engineer/developer just by looking at their code? - Quora

5 traits of good systems architecture | Opensource.com
Multicall binaries · Flameeyes's Weblog

Tools

Editors_and_IDEs

Vim

Vim (text editor) - Wikipedia
vim - Traversing text in Insert mode - Stack Overflow
How to get ctags working inside vim - Stack Overflow
Simple VIM commands you wish you'd known earlier - Stack Overflow
An Intro to Vim, the Unix Text Editor Every Hacker Should Be Familiar With « Null Byte :: WonderHowTo
GitHub - archSeer/colibri.vim: A subtle, elegant color scheme for vim.
How to Turn on Line Numbers in vim – How-To Geek Pro
How to reload .vimrc file without restarting vim on Linux/Unix - nixCraft
statusline - How can I see the full path of the current file? file name
vim vs gvim at DuckDuckGo
key bindings - What options are there to enter insert mode? - Vi and Vim Stack Exchange
unix - sometimes my file just freezes in my vi |vim, what happened? - Stack Overflow
Vim Search/Replace, meaning of %s - definitive syntax
vi - Find and replace strings in vim on multiple lines - Stack Overflow
text editor - Navigating in Vim's Command Mode - Stack Overflow
Search and replace | Vim Tips Wiki | FANDOM powered by Wikia
How do you reload your .vimrc file without restarting vim? - Super User
What's a quick way to comment/uncomment lines in Vim? - Stack Overflow
editor - Vim unresponsive after a C-x C-s sequence - tty
command line - Open an existing file from Vim - Ask Ubuntu
mac - How does one switch between windows on VIM? - Super User
How to open files in vertically/horizontal split windows in Vim from the command line - Super User
Features of Emacs that are complementary to Vim? - Super User
There and Back Again - A Hacker’s Switch from Emacs Back to Vi - The Joy Of Hack
vi - What is your most productive shortcut with Vim? - Stack Overflow
Vim
Tutorial | Vim Tips Wiki | FANDOM powered by Wikia
Vim Cheat Sheet - English
DEFINITIVE - Vim tips: The basics of search and replace - g global, c confirm flags , % meaning -

Emacs

Configuring_Emacs

Setting_Up_C-Cpp_IDE_In_Emacs

C/C++ Development Environment for Emacs
EmacsWiki: Cc Mode

Setting_Up_Python_IDE_In_Emacs

EmacsWiki: Python Programming In Emacs
Jedi.el - Python auto-completion for Emacs — Emacs Jedi 0.2.0alpha2 documentation
Emacs – The Best Python Editor? – Real Python
Emacs Tutorial | Setup python Environment - YouTube

How do I display line numbers in Emacs (not in the mode line)? - Super User
GUI vs. terminal version of emacs - recommendations? : emacs
plugins - Display line numbers on left margin in Emacs - Super User
display - How can I get a ruler at column 80? - Emacs Stack Exchange
package - Do I still need GNU ELPA if I have MELPA? - Emacs Stack Exchange
Are emacs package repositories a security risk? : emacs
emacs package management security at DuckDuckGo
Understanding GNU Emacs and Tabs
EmacsWiki: No Tabs
EmacsWiki: Tabs Are Evil
Great Emacs Lisp Snippets

Using_Emacs

Emacs avancé
Emacs Mini Manual (PART 1) - THE BASICS
EmacsWiki: Site Map
EmacsWiki: Backspace Key
How to create LaTeX documents with Emacs | Opensource.com
GNU Emacs cheat sheet - definitive - refcard.pdf
emacs cheat sheet

syl20bnr/spacemacs: A community-driven Emacs distribution - The best editor is neither Emacs nor Vim, it's Emacs *and* Vim!
Dired Shell Commands: The find & xargs replacement - Mastering Emacs

Visual_Studio

vscode

Running Visual Studio Code on Linux - compare with WyPlay's Visual Studio Code Genbox Installation regarding pgp/gpg key installation - equivalence /usr/share/keyrings/ and apt-key add command - equivalence between add-apt-repository and manually adding repo into /etc/apt/sources.list.d
C++ programming with Visual Studio Code
Debug C++ in Visual Studio Code
Edit and navigate C++ code in Visual Studio Code
Customize default settings in Visual Studio Code C++ projects
C/C++ extension FAQ
Tasks in Visual Studio Code - tasks.json
VS Code settings you should customize - DEV Community 👩‍💻👨‍💻
How to edit settings.json in Visual Studio Code?
Settings - vscode - visual studio code - settings.json

12.04 - Why ubuntu has vi , emacs ,nano with os default? - Ask Ubuntu
Differences between Emacs and Vim - Stack Overflow
CLion: A Cross-Platform IDE for C and C++ by JetBrains
ReSharper C++ : The Visual Studio Extension for C++ Development
AppCode: Smart Swift/Obj-C IDE for iOS & macOS Development
Why I switched to VIM from Visual Studio Code
My editor journey: sublime, vim, emacs, vscode - DEV Community 👩‍💻👨‍💻
REAL programmers don’t use Visual Studio - By
Any long time emacs users tried VSCode? : emacs
Goodbye VSCode, Hello Emacs Again | Hacker News

Compilers

Compilation_vs_Interpretation

Interpreter, Compiler, JIT - Nick Desaulniers

Cross Compiling C/C++ for Android - Nick Desaulniers

Build_Systems

CMake

A CMake tutorial for Visual C++ developers - CodeProject
c++ - Difference between using Makefile and cmake to compile the code - Stack Overflow
c++ - Debug vs Release in CMake - -DCMAKE_BUILD_TYPE=Release/Debug
CMake - Wikipedia
More Modern CMake - Deniz Bahadir - Meeting C++ 2018 : Standard C++
An Introduction to Modern CMake · Modern CMake
GitHub - mortennobel/CMake-Cheatsheet: Short introduction to CMake with some examples.
CMake Cheat Sheet | OverAPI.com
CMake stuff i wish i knew earlier
mbedded.ninja | CMake Cheat Sheet
CMake cheatsheet | LeechCraft
Cmake cheat sheet - Make release build
CMake: dependencies between targets and files and custom commands | Sam Thursfield's Blog
CMake-tutorial-pdf*
Effective Modern CMake · GitHub
Hello CMake! - Simplify C++!
c++ - What are the differences and similarities between CMake and qmake? - Stack Overflow
Why is CMake so popular, and what do you have to do to make it actually work? vs Autotools
CMake Howto
C++ Tutorial: make & CMake - 2018
CMake Definitive Tutorial - cross-platform CMake-based build system - Unix - Building a Library with CMake, shared vs static .so, .lib, .a, .dylib, .dll on Windows, Mac OS X and Linux, performance impact - Compiler/Linker Flags with CMake - Generator/Conditional Expressions - Debug and Release Configuration
CMake by Example – definitive introductory tutorial - -DCMAKE_INSTALL_PREFIX - Change Build System Generator from makefile to xcode
Make and CMake : Automating C++ Build Process - Coding Blocks - Medium
Introduction to CMake by Example | derekmolloy.ie
How to Build a CMake-Based Project
Running CMake | CMake
How to retrieve a user environment variable in CMake (Windows) - Stack Overflow
How exactly does CMake work? - Stack Overflow
Definitive FAQ · Wiki · CMake | out-of-source VS in-source builds
ccmake or cmake? ccmake is curses (terminal handling library) interface to CMake - cmake is the CLI
It’s Time To Do CMake Right | Pablo Arias
build - What are the dusty corners a newcomer to CMake will want to know? Finding and configuring 3rd-party libraries - caching variables
The Ultimate Guide to Modern CMake
What is the modern method for setting general compile flags in CMake? - Stack Overflow
Introduction to the Basics · Modern CMake - definitive guide - PUBLIC/PRIVATE/INTERFACE -

qmake vs cmakelist - Google Search
Qbs Manual
Simplifying build in C++ (part 1) · Mathieu Ropert

Makefile

c - How does make know which files to update - stat(2) linux command - NTP, system clocks
Makefile - Wikipedia
Make (software) - Wikipedia
How to get a shell environment variable in a makefile? - Stack Overflow
c++ - Add .so and .a libraries to Makefile - Stack Overflow

c++ - Skipping Incompatible Libraries at compile - Stack Overflow

Autotools

Flag Variables Ordering (automake)
Introduction to GNU Autotools - definitive - automake, autoconf
GNU Libtool - typically used with Autoconf and Automake - shared, static, dynamic libraries - autotools
gcc - Howto add a link to a library in autoconf configure script / makefile - Makefile.am - automake
c - How to add CFLAGS in makefile.am - automake, autoconf
HardeningWalkthrough - dpkg-buildflags
Autotools Tips (configure.ac, Makefile.am, autoconf, automake, etc) - ClearChain
Autoconf - definitive - autotools, autoscan, aclocal, autoheader, automake
DEFINITIVE - The Basics of Autotools – Gentoo Development Guide
c - Where to add a CFLAG, such as -std=gnu99, into an autotools project - Stack Overflow
c - what is the difference between AM_LDFLAGS and LDFLAGS - Stack Overflow

CFLAGS - CXXFLAGS vs CPPFLAGS C PreProcessor

Exploring Clang Tooling Part 2: Examining the Clang AST with clang-query—Stephen Kelly : Standard C++
Exploring Clang Tooling Part 1: Extending Clang-Tidy—Stephen Kelly : Standard C++

GCC

gdb - What is the difference between gcc -ggdb and gcc -g - Stack Overflow
Tips on the GCC compiler
Using the GNU Compiler Collection (GCC): C Dialect Options
How to compile a 32-bit binary on a 64-bit linux machine with gcc/cmake - Stack Overflow
Using the GNU Compiler Collection (GCC): Debugging Options
Using the GNU Compiler Collection (GCC): Warning Options
Using the GNU Compiler Collection (GCC): Top
c++ - How do you disable the unused variable warnings coming out of gcc in 3rd party code I do not wish to edit? -Wno-unused-variable, -isystem vs -I - Stack Overflow
c++ - What is "strip" (GCC application) used for? stripped - Stack Overflow
GNU Compiler Collection (GCC) Internals: Top
gcc -l -L option flags for library link
c++ - What are the GCC default include directories? - Stack Overflow
c - Do I need -pedantic flag from GCC with C11? - Stack Overflow
c - Do I need -pedantic flag from GCC with C11? - Stack Overflow

Compiler - Wikipedia
c - Why was mixing declarations and code forbidden up until C99? - Stack Overflow
c - C89, Mixing Variable Declarations and Code - Stack Overflow
Translation unit = Compilation unit vs object file vs executable vs.... in C++ - Stack Overflow
c++ - What's the difference between the terms "source file" and "translation unit"? - Stack Overflow

Preprocessing

Macros

C Pre-Processor Magic - macros - definitive
DEFINITVE - Advanced preprocessor tips and tricks - macros - side effects, sequence point undefined behavior - stringizing # operator, ## concatenation operator - #ifdef vs #if
Tips And Tricks For The C Pre-processor | macros
c++ - What are some tricks I can use with macros? preprocessor - X-Macros - errno simplification - logging
The C Preprocessor: Top - macros
Preprocessor: __VA_ARGS__ : count arguments
c - What does __VA_ARGS__ in a macro mean? - Stack Overflow
Variadic macro - C preprocessor - ## GCC non portable extension
Detect empty macro arguments – Jens Gustedt's Blog
Two C++ tricks used in Verdigris implementation
DEFINITIVE - Replacing text macros - #, ##
variadic_macros.html
Variadic macros - ## operator
Variadic macros | __va_args_

Source file inclusion in C++ - cppreference.com
The C Preprocessor: Search Path
Source file inclusion in C - cppreference.com
Include directive - h extension - Wikipedia
C preprocessor = CPP - macros - conditional compilation - CPPFLAGS
DEFINITIVE - CFLAGS, CPPFLAGS, CXXFLAGS - what exactly do these variables control? - Stack Overflow
c - Is #if defined MACRO equivalent to #ifdef MACRO? - Stack Overflow
visual c++ - C++ Preprocessor Standard Behaviour - __va_args__ - macros

Bootstrapping (compilers) - technique for producing a self-compiling compiler — that is, compiler (or assembler) written in the source programming language that it intends to compile. An initial core version of the compiler (the bootstrap compiler) is generated in a different language (which could be assembly language); successive expanded versions of the compiler are developed using this minimal subset of the language.
compilation - How can a compiler compile itself? - Stack Overflow

Additional C/C++ Tooling - Nick Desaulniers

Code_Source_Management-Version_Control_Systems

Git

How to Use Git Version Control System in Linux [Comprehensive Guide]
architecture of git command at DuckDuckGo
Microsoft and GitHub team up to take Git virtual file system to macOS, Linux – Ars Technica
Please, oh please, use git pull --rebase (Example)
Introducing security alerts on GitHub · GitHub
Git - Book
What's the difference between a fork and clone? | Opensource.com
The GitHub Tutorial: 10+ hacks to boost your skills - Usersnap
GitLab vs GitHub: What Are The Key Differences?
Definitive step-by-step guide to Git | Opensource.com
A guide to bootstrapping your open source project with GitHub | Opensource.com
Tig - A Command Line Browser for Git Repositories
Create a branch in Git from another branch - Stack Overflow
Git - Wikipedia
Numerous undo possibilities in Git | GitLab
How to reset, revert, and return to previous states in Git | Opensource.com
git - How to discard all changes made to a branch? git checkout -f
how to discard git local branch changes? git reset --hard

centralized code source control vs decentralized - Google Search
source code control vs version control - Google Search
svn vs git - Google Search
tfs vs svn - Google Search
tfs vs git vs svn - Google Search
Comparison of version-control software - Wikipedia
List of version-control software - Wikipedia
Distributed version control system - DVCS - vs centralized source control systems - Wikipedia
Version control system - VCS - Wikipedia

Project_Management_Softwares

Track & manage projects or tasks (for a solo developer) - Software Recommendations Stack Exchange

Mobile_Tools

10 must have apps for programmers if they want to be professional » TechWorm
truffleHog - Searches Through Git Repositories For High Entropy Strings And Secrets, Digging Deep Into Commit History - KitPloit - PenTest Tools for your Security Arsenal ☣
10 Must Apps for the Programmers if they want to be professional - Coding Security

Projects

Own_Projects

SimpleCLogger

Logfile - Wikipedia, the free encyclopedia
GitHub - gabime/spdlog: Fast C++ logging library.
Log file - Wikipedia
The Art of Logging - CodeProject
Logging in C++ - CodeProject
Logging In C++ | Dr Dobb's
Logging In C++ | Dr Dobb's
Logging In C++: Part 2 | Dr Dobb's
Simple logger for C++ - CodeProject
hardcodet.net » An Introduction to SLF, the Simple Logging Façade
CS635: Doc 6, Logging: A Use of Singleton

Building_Compilers

Writing a minimal x86-64 JIT compiler in C++ | Solarian Programmer
Writing a C Compiler, Part 5
Writing a C Compiler, Part 1
Compiler Design I

Building_Search_Engine

Anatomy of a relevant search engine (part 1) - CodeProject
I am planning to make a small scale search engine on my local system; from where should I start? - Quora
How San Quentin Inmates Built JOLT, a Search Engine for Prison | WIRED

The secret to being a top developer is building things! Here’s a list of fun apps to build!
How to develop a virtual disk for Windows - CodeProject
How to develop your own Boot Loader - CodeProject
Geeks Gifts: Surprise a Girl with ASCII Art Flowers Program - CodeProject
GitHub - Cryptogenic/CPP-Easy-Socket: An easy to use, higher abstraction socket class for usage in C++.

Building_Compilers

✅ Every time you build a to-do list app, a puppy ? dies ?
What are some fun projects to try out using an API? - Quora
Florin Pop - 15+ App Ideas to Build to Level Up Your Coding Skills
15 App Ideas to Build and Level Up your Coding Skills
A list of sample Web App Ideas
how to build a rss feed reader at DuckDuckGo
How to Integrate Stripe Payments in Web Application? - Stripe products
Create a Python powered dashboard in under 10 minutes - plotly
Build a realtime payment dashboard with Stripe
Building a Serverless Stripe Analytics Dashboard | Cube.js Blog
Algorithmics data structures: Data structures - basic implementation - stack, queue, qrray list, linked list, double circular list, binary search tree, AVL tree, red black tree, hash table, heap, floyd algorithm complexity - Template metaprogramming TMP

Local_Bookmarks_URLs_Adpater

bookmarks - Mozilla | MDN
Work with the Bookmarks API - Mozilla | MDN
Startpage.com - The world's most private search engine

FOSS_Projects

Lists

awesome-cpp: A curated list of awesome C++ (or C) frameworks, libraries, resources, and shiny things - Memory Allocation malloc, jemalloc, mimalloc, hoard, C smart Pointers - cryptography, bcrypt, beecrypt, crypto++, tiny aes c - Game Engines - Networking, Boost, Asio - Image Processing - Inter Process Communication - Logging - Libraries for parsing and manipulating PDF documents - Regexes -Robotics - VMs - Coding Styles/Standards -
Little open source projects that made a big impression in 2016 | Opensource.com

Contributing

Personal projects development - Google Sheets
best open source project to contribute - Google Search
Leveraging Open Source - Everything You Wanted to Know About Open Source that Nobody Told You (including getting paid to do it) on Vimeo
Up For Grabs
MunGell/awesome-for-beginners: A list of awesome beginners-friendly projects.
fffaraz/awesome-cpp: A curated list of awesome C/C++ frameworks, libraries, resources, and shiny things. Inspired by awesome-... stuff.
Algos/C++ at master · faheel/Algos
RadixEngine/source at master · GlPortal/RadixEngine
ethminer/ethminer at master · ethereum-mining/ethminer
The Chromium Projects
smali/Smali.java at master · JesusFreke/smali
modern c++ open source projects to contribute for - Google Search
hioa-cs/IncludeOS: A minimal, resource efficient unikernel for cloud services
The LLVM Compiler Infrastructure Project
Boost C++ Libraries
KDE Community Home - KDE.org
WebKit and C++11 | WebKit
Open Whisper Systems
Home · rapid7/metasploit-framework Wiki
Contribute on Open Source Friday · GitHub
radare/radare2: unix-like reverse engineering framework and commandline tools
installation/rkhunter: Rootkit Hunter install script

What's the difference between open source software and free software? | Opensource.com
Stop Calling Everything "Open Source": What "Open Source" Really Means
I thought I understood Open Source. I was wrong – Hacker Noon
The Difference Between Free and Open-Source Software | DigitalOcean
Why Open Source Misses the Point of Free Software - GNU Project - Free Software Foundation
Free and open-source software - Wikipedia
Gratis versus libre - Wikipedia

7 Ways to Get Better at C++ During this Summer - Fluent C++
Personal projects development - Google Sheets

Coding_Challenges

Interview_Preparation

Problem_Solving_Skills

Top 15 data structures and algorithms interview questions - Coding Security
Here are 20 really tough questions that Google asks during Job Interview » TechWorm
30 Toughest Questions Asked In Apple Interviews
Facebook's toughest job interview questions, try answering them » TechWorm
29 Toughest Questions Asked in Facebook Job Interviews
11 Questions That Were Asked at SpaceX Internship Interviews
41 Toughest Questions Google Will Ask You At Job Interviews
Most Common Programming Questions in the Interviews about data structures - Coding Security
5 Most Common Interview Questions on Algorithms - Coding Security

rshaghoulian/Cracking-the-Coding-Interview_solutions: Efficient solutions to "Cracking the Coding Interview" (6th Edition) problems
GitHub - jwasham/coding-interview-university: A complete computer science study plan to become a software engineer.
Here is the List Of Skills Google Want Its Software Engineers To Have
GitHub - mission-peace/interview: Interview questions
rshaghoulian/HackerRank_solutions: HackerRank Solutions - 320 efficient solutions to HackerRank problems
Get that job at Facebook
5 questions you’ll be asked on your first job interview | Monster.com
Find Jobs in the US. Build a Career. Find Your Calling | Monster.com
How to avoid clichés that put interviewers to sleep | Monster.com
4 Toughest Questions You'll Face at an Entry-Level Interview | Monster.com
production engineer at DuckDuckGo
Production Engineering – Facebook Code
Stevey's Blog Rants: Get that job at Google
What is it like to be a production engineer at Facebook? How different a role is it from a software engineering role? In terms of compensation, how would you compare the two? - Quora
Production Engineers at Facebook have a... - Facebook Careers
Facebook Open Source
Production Engineering – Facebook Code
first stage facebook interview at DuckDuckGo
How should I prepare for a production engineer interview at Facebook? - Quora
How to get your dream job in tech: 100+ company guides | Pathrise
Choose the right language for your coding interview - Byte by Byte
For coding interviews at top tier companies like Google, Facebook, etc., is C a suitable language? - Quora
Choosing a Programming Language for Interviews & Jobs
Preparing for a technical interview with programming contests | Facebook
Preparing for your Software Engineering Interview at Facebook - coding, systems design
Coding Practice - InterviewBit - Interview Questions and Mocks - Programming - System Design - Shell Scripting, Regex - Databases - Puzzles
interview-preparation · GitHub Topics · GitHub
How To Approach Any Algorithm Interview Without Panicking
The 30-minute guide to rocking your next coding interview
Part 2: How to prepare for your next coding interview?
Cracking the Coding Interview v6 Errata & Changes - Google Sheets
free anonymous technical interview practice - mock interview

Project_Euler

Archived Problems - Project Euler
project euler best solutions at DuckDuckGo
project euler best solutions python at DuckDuckGo

Interview Practice | CodeFights
Dashboard | HackerRank
Refactor yourself. Train your programming skills - Codility
Coding Games and Programming Challenges to Code Better
LeetCode - The World's Leading Online Programming Learning Platform
Train with Programming Challenges/Kata | Codewars
GeeksforGeeks | A computer science portal for geeks
UVa Online Judge - Home
Timus Online Judge
Codeforces
CodeKata
How to prepare for ACM - ICPC? - GeeksforGeeks
Embedded C Quiz | Barr Group
Embedded C++ Quiz | Barr Group

Multithreading_Programming

Multi-Threading The Truth · Our Machinery
Granularity (parallel computing) - Wikipedia

Graphics_And_Game_Development

How to Write Your Own C++ Game Engine
How does screen capture work? - Quora

Web_Development

Web_Browser_Extensions_Development

Firefox Add-ons WebExtensions State July 2017 - gHacks Tech News
Browser Extensions | MDN
Installing extensions - MozillaZine Knowledge Base
Install a Firefox Add-on Manually
11.04 - How to install .xpi file for firefox? - Ask Ubuntu
How to modify .xpi file(Firef0x addon). – Jagjeet Singh
Firefox : Mozilla annonce le support officiel des WebExtensions, des extensions qui devraient être compatibles avec les principaux navigateurs

Building_Website

WordPress.com vs WordPress.org – Which is Better? (Pros and Cons)
How to Learn WordPress for Free in a Week (or Less)
27 Easy Ways to Increase Your Blog Traffic by 406% (for FREE)
How Much Does It Cost to Build a WordPress Website? (2020)
How to Make a WordPress Website - Easy Tutorial - Create Website (2020)
Why is WordPress Free? What are the Costs? What is the Catch?
How to Choose the Best Domain Name (14 Tips and Tools)
WordPress.com vs WordPress.org – Which is Better? (Pros and Cons)
6 Important Reasons Why You Should Use WordPress for Your Website
WordPress Hosting - Bluehost
7 Best Wix Alternatives in 2020 (More Powerful and Reliable)
Website Builder: Intelligent, Fast & Free | Constant Contact
Email Marketing Software | Constant Contact Pricing
Plans & Pricing with Feature Comparison | Constant Contact
Constant Contact Review | PCMag
Constant Contact Review 2020 | Email Marketing and Survey Software Reviews - business.com
The 21 Best Free Website Builders of 2020: Their Pros & Cons
The Best Cheap Web Hosting Services for 2020 | PCMag
The Best Website Builders for 2020 | PCMag
déménageur - English translation – Linguee
Startpage.com - The world's most private search engine
16 Best Moving and Storage WordPress Themes 2020 - Colorlib
Top 7 Best Moving Company WordPress Themes for 2020 | Compete Themes
Best Web Hosting 2020 - Domains - WordPress - Bluehost
Moving Company Templates from ThemeForest
50 greatest drives: UK's best road trips | Boundless by CSMA
Startpage.com Search results
Startpage.com Search results
WordPress vs Drupal - Which One is Better in 2020? (Pros and Cons)
Startpage.com Search results
How to Legally Use Images in Your Social Media Marketing : Social Media Examiner
Download | WordPress.org
How to install WordPress | WordPress.org
WordPress Hosting Recommendations | WordPress.org
WordPress.com Apps - Mobile Apps
Startpage.com Search results
BlueHost Review: They’re A Popular Hosting Provider, But Does That Mean They’re The Best? - Digital.com
Sign Up Now - Bluehost
Bluehost Review 2020: 7 Things They Don't Tell You (with Screenshots)
Bluehost Review: 5 Reasons Why Bluehost Is Terrible For Web Hosting
Bluehost Reviews - 10 Pros & Cons You Should Know in 2020
BlueHost Review (2020) – Why It’s Simply Not Worth the Hype
Startpage.com Search results
wordpress search engine optimization ebooks - All IT eBooks
WordPress Search Engine Optimization, 2nd Edition.pdf
Site Tools
My SiteGround Account
Home ‹ Déménageur Pro — WordPress
Request a Quote – WordPress plugin | WordPress.org
YITH WooCommerce Request A Quote – WordPress plugin | WordPress.org
How to Create a Request a Quote Form in WordPress
Startpage.com Search results

Web_APIs-Web_Services

swagger vs oadf - Google Search
Get started with REST services with Apache Camel | Opensource.com
What is REST?
REST Vs SOAP - What is the difference? | Tech Primers - YouTube
Laravel API Tutorial: Building & Testing a RESTful API | Toptal
Understanding And Using REST APIs — Smashing Magazine
How APIs work — An Analogy For Dummies – Timothy Choi – Medium
swagger vs oadf - Google Search
An introduction to microservices | Opensource.com
API Evangelist

Self-hostable_Web_Apps

GitHub - bashrc/freedombone: Run your own internet services http://yjxlc3imv7obva4grjae6u3qw527koaytrgjgdp364hmthrst3jodiid.onion
GitHub - Kickball/awesome-selfhosted: This is a list of Free Software network services and web applications which can be hosted locally. Selfhosting is the process of locally hosting and managing applications instead of renting from SaaS providers. Privacy-respectuous alternative

Advertisement_Developement-Blocking

how do adblockers work at DuckDuckGo

Raspberry Pi: Your Very Own Development Server | Toptal
angular vs node js at DuckDuckGo
jboss vs node at DuckDuckGo
how do a website work without javascript - Google Search
Python eCommerce | Build a Django eCommerce Web Application | Udemy
Speeding up crypto on Wire desktop apps – Wire – Medium
GitHub - dest4/stream-audio-fingerprint: Audio landmark fingerprinting as a Node Stream module
Introducing HumbleNet: a cross-platform networking library that works in the browser – Mozilla Hacks – the Web developer blog
Building a Simple Web App with Bottle, SQLAlchemy, and the Twitter API - Real Python
🙈 A lot of people will hate our tech stack, but here it is
how url shorteners work at DuckDuckGo
programmatically determine if a phone number is provided by a regular carrier at DuckDuckGo
A Framework or a CMS? What is better to choose? | Web and Development
https://opensource.com/open-organization/18/6/building-professional-social-networks-openly
Build your first Redis Hello World application in Python | Opensource.com
A modular network stack - protocol labs
C++: A language for next generation web apps
Why is C++ not used in web development? - Quora
Can C++ be used as a server-side web development language? - Software Engineering Stack Exchange
Why isn't C++ used to develop web applications? : cpp
c# - The importance of knowing c++ for web application development - Stack Overflow
Web framework - client/server-side - AJAX
Skulpt - Client side web development with Python

Mobile_Development

xamarin vs ionic vs react native 2017 - Google Search
free alternatives to xamarin - Google Search
xamarin vs ionic vs react native 2017 - Google Search
free alternatives to xamarin - Google Search
xamarin vs ionic vs react native 2017 - Google Search
free alternatives to xamarin - Google Search

Augmented_Reality_Development

Apple_ARKit

occlusion apple arkit - Google Search
Make Your Own Matrix Movie with This Simple ARKit Demo | Toptal
occlusion arkit - Google Search
occlusion arkit - Google Search
ARKit | Apple Developer Documentation
GitHub - olucurious/Awesome-ARKit: A curated list of awesome ARKit projects and resources. Feel free to contribute!
video-quickstart-swift/ARKitExample at master · twilio/video-quickstart-swift · GitHub
GitHub - artemnovichkov/iOS-11-by-Examples: 👨🏻‍💻 Examples of new iOS 11 APIs
arkit-occlusion/Occlusion at master · bjarnel/arkit-occlusion · GitHub
Virtual Realities - YouTube - YouTube
Vision | Apple Developer Documentation
ios-arkit-snippets/Snippets at master · ccabanero/ios-arkit-snippets · GitHub
GitHub - ccabanero/ios-arkit-landscapeviz: Using ARKit for Landscape visualization
GitHub - jeffreybergier/Blog-Getting-Started-with-Vision: Blog: Getting Started with Vision on iOS 11
ARKit Tutorial with SceneKit | iOS Swift Tutorials by Jameson Quave
Super Impressive and Easy Face Detection using Vision API in Swift 4 - YouTube
iOS ARKit Tutorial: Drawing in the Air with Bare Fingers | Toptal
occlusion apple arkit - Google Search
ARKit + Vision: An intriguing combination
Core ML | Apple Developer Documentation
ios - How is facial recognition built into Core ML vision framework - Stack Overflow
Core ML and Vision: Machine Learning in iOS 11 Tutorial
GitHub - ccabanero/ios-coreml-snippets: Code snippets using CoreML - an iOS framework for running trained Machine Learning models.
Swift CoreML Image Recognition Tutorial - Seemu AppsSeemu Apps
CoreML: Real Time Camera Object Detection with Machine Learning - Swift 4 - YouTube
CoreML-in-ARKit/ViewController.swift at master · hanleyweng/CoreML-in-ARKit · GitHub
occlusion arkit - Google Search

Cross-Platform_Portability

Porting - Wikipedia
newlines - What's the point in adding a new line to the end of a file? - Unix & Linux Stack Exchange

Resources

Rosetta Code - equivalence between programming languages
World's five most difficult programming languages to learn » TechWorm
Dashboard | Codecademy
Top 5 smartphone apps to learn programming on the go » TechWorm
5 Android Apps Every Programmer Must have
18 open source translation tools | Opensource.com
Eli Bendersky's website
ZeroMQ, nanomsg, libdill, Cartesian softwares - misc prorgamming, software engineering thoughts

What I Wish I'd Known When I Started Functional Programming
Code golf - Wikipedia

Graphical_Design

User_Experience_Design

The Most Important Rule in UX Design that Everyone Breaks

Text-based_User_Interface

curses (programming library) - Wikipedia
Text-based user interface - Terminal User Interface - TUI - Wikipedia

Testing

GoogleTest

googletest - error during making GTest - definitive installation guide of gtest via apt get
c++ - Including gtest libraries in Makefiles for unit test files - LD_LIBRARY_PATH, /etc/ld.so.conf - -l, -L flags - /usr/lib default libraries directory by linker - definitive linking against library gcc/g++
GitHub - google/googletest: Googletest - Google Testing and Mocking Framework
Google Test Official Documentation - main function
How to build Google Test and Google Mock Libraries
Google Mock library Official Documentation - How to Build
c++ - GoogleTest vs CppUnit: The facts - Stack Overflow

CUnit

CUnit Home
CUnit: Main Page - doxygen doc
CUnit - Table of Contents
TDD using CUnit: First Steps - testing
Introduction to C Unit Testing (CUnit)
CuTest: The Cutest C Unit Testing Framework
CUnit Example
CUnit - Introduction

CppUTest

cpputest/CheatSheetTest.cpp at master · cpputest/cpputest · GitHub
CppUTest - Official site - How to install - coverage report with lcov
Cpputest - Official Documentation - manual
GitHub - cpputest/cpputest: CppUTest unit testing and mocking framework for C/C++
Mock object - Wikipedia

List of unit testing frameworks - Wikipedia
Unit Testing C Code - aceunit vs gnu autounit vs cUnit vs CUnit vs CuTest vs CppUnit vs embUnit for embedded systems vs MinUnit vs CUnit for Mr Ando vs CMocka vs Criterionvs HWUT vs CGreen - GoogleTest
xUnit - Wikipedia
Unit Testing and Coding Best Practices for Unit Tests: A Test-Driven Perspective | single responsiblity principle SOLID - dependency injection
Hamcrest - Software testing technique - Assertions styles - supports creating customized assertion matchers - Hamcrest is an anagram of matchers
Using Hamcrest for testing - Tutorial
Write a Test Case - Nick Desaulniers
Test Driven Development book source code - jlangr/c2: Chapter First Example
Test-driven development and unit testing with examples in C++
Is Unit Testing worth the effort? - Stack Overflow
Why Most Unit Testing is Waste - Python Testing

Methodologies

DevOps

Stumped by DevOps? Experts share their views on how to do DevOps right – GeekWire
Top Three Reasons Why We Like Ansible - DZone DevOps
How to avoid getting hoodwinked by a DevOps hustler • The Register
A complete beginner's guide to DevOps best practices

Agile

So you're 'agile', huh? I do not think it means what you think it means • The Register
Exploring the open development method | Opensource.com

How to be more productive by focusing on the right things (for programmers)
To self-doubting developers: are you good enough? – freeCodeCamp
How to think like a programmer — lessons in problem solving

Company-Wise

Star certification | Ethical hacking, Cyber security, Software certification
5 Awesome ways Developers Can Make Extra Money From Home
The Innovator's Dilemma - Wikipedia
The Rise of ``Worse is Better'' - tech ideas
Tips for using Twitter to promote your open source projects | Opensource.com

Resources

Top 5 YouTube Channels to Learn Programming
5 Lessons to Become a Really Good Self-Taught Programmer
How to Be An Insanely GOOD Developer – Hacker Noon
11 technologies developers should explore now | InfoWorld
Steve Friedl's Home Page

Cyber_security

Cyber-Security_and_Hacking_Learning

Methodologies_Blueprints_Skills

ISECOM - Open Source Security Testing Methodology Manual (OSSTMM)
osstmm methodology at DuckDuckGo

Attack_Process

Reconnaissance-Planning

Passive_Reconnaissance-Information_Gathering-Footprinting

OSINT-SOCMINT

Dorking

Google hacking - Wikipedia
Google Hacking Database, GHDB, Google Dorks
Google Hacking Database (GHDB) - Offensive Security
Google Dorking
How to Use Google to Hack(Googledorks) « Null Byte :: WonderHowTo
Top Five Ways the Red Team breached the External Perimeter
What is 'Google dorking' and what is the defense against this problem? - Quora
Google Hacking: What is a Google Hack?
GitHub - utiso/dorkbot: Command-line tool to scan Google search results for vulnerabilities
How to make advanced search on Google using Google Dorking » TechWorm
Google Dorks - PenTestIT

Non_Private_Search_Engines

Baidu - 百度一下
Baidu - Wikipedia
Top 5 Chinese Search Engines You Need to Care About (2019)
Binsearch -- Usenet search engine

Datasploit - An OSINT Framework To Perform Various Recon Techniques On Companies, People, Phone Number, Bitcoin Addresses, Etc., Aggregate All The Raw Data, And Give Data In Multiple Formats - KitPloit - PenTest Tools for your Security Arsenal ☣
Video: How to Use Maltego to Research & Mine Data Like an Analyst « Null Byte :: WonderHowTo
raven - Linkedin Information Gathering Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
GitHub - jivoi/awesome-osint: A curated list of amazingly awesome OSINT
OSINT : Chasing Malware + C&C Servers – secjuice™ – Medium
gOSINT - Open Source Intelligence Framework - KitPloit - PenTest Tools for your Security Arsenal ☣
GitHub - famavott/osint-scraper: Social Recon
GasMask - Information Gathering Tool (OSINT) - KitPloit - PenTest Tools for your Security Arsenal ☣
GitHub - Te-k/harpoon: CLI tool for open source and threat intelligence
Bizapedia - Find Companies, People, Addresses, Phone Numbers, & Trademarks
Top Five Open Source Intelligence (OSINT) Tools
Compass Security OSINT Cheat Sheet - osint_cheat_sheet.pdf
How to Use Facial Recognition to Conduct OSINT Analysis on Individuals & Companies « Null Byte :: WonderHowTo
Scammers abused Facebook phone number search - BBC News
How to Find Anyone's Private Phone Number Using Facebook « Null Byte :: WonderHowTo
Tinfoleak v2.4 - The Most Complete Open-Source Tool For Twitter Intelligence Analysis - KitPloit - PenTest Tools for your Security Arsenal ☣
Open Source Intelligence (W40) - Hakin9 - IT Security Magazine
Offensive and Defensive Doxing · AnarchoTechNYC/meta Wiki · GitHub

how to know the location of an ip address - Google Search
Hack Like a Pro: How to Conduct Passive Reconnaissance of a Potential Target « Null Byte :: WonderHowTo
how to know the location of an ip address - Google Search
Whois Gateway

Active_Reconnaissance-Scanning-Fingerprinting

DNS_Analysis

DNSdumpster.com - dns recon and research, find and lookup dns records
GitHub - nethunteros/punter: Hunt domain names using DNSDumpster, WHOIS, Reverse WHOIS, Shodan, Crimeflare

Vulnerabilties_Assessment-Scanning

Scanning_Techniques

Vulnerabilities_Search_Engines-Scanners

Shodan
Shodan (website) - Wikipedia
Censys
Punk.sh
Acunetix Vulnerability Scanner: Web Application Security
Archery - Open Source Vulnerability Assessment And Management Helps Developers And Pentesters To Perform Scans And Manage Vulnerabilities - KitPloit - PenTest Tools for your Security Arsenal ☣
How to Use Dorkbot for Automated Vulnerability Discovery « Null Byte :: WonderHowTo
5 Hacker-Friendly Search Engines You Must Use - Deep Dot Web
Shodan Queries - PenTestIT
Do you like Shodan? You will love Censys! – So Long, and Thanks for All the Fish
Finding All the Things with Shodan and Censys | Andrew McNicol | Pulse | LinkedIn
A Search Engine for the Internet’s Dirty Secrets - MIT Technology Review
Is Shodan Really the World's Most Dangerous Search Engine? - VICE
What are IoT search engines Shodan and Censys and what are they capable of – Kaspersky Lab official blog
BuckHacker: This Search Engine Lets You Find Hackable Servers With Ease
Online Vulnerability Scanners and Network OSINT | HackerTarget.com
Hack Like a Pro: How to Find Vulnerable Webcams Across the Globe Using Shodan « Null Byte :: WonderHowTo
Hack Like a Pro: How to Find Website Vulnerabilities Using Wikto « Null Byte :: WonderHowTo
How to Discover Computers Vulnerable to EternalBlue & EternalRomance Zero-Days « Null Byte :: WonderHowTo
Hack Like a Pro: How to Find Vulnerabilities for Any Website Using Nikto « Null Byte :: WonderHowTo
How to Spider Web Pages with Nmap for SQLi Vulnerabilities « Null Byte :: WonderHowTo
Researcher released a free EternalBlue vulnerability scanner - Security Affairs
Hack Like a Pro: How to Find Vulnerable Targets Using Shodan—The World's Most Dangerous Search Engine « Null Byte :: WonderHowTo

Nmap

Hack Like a Pro: How to Conduct Active Reconnaissance and DOS Attacks with Nmap « Null Byte :: WonderHowTo
How to Get Started Writing Your Own NSE Scripts for Nmap - Script Engine - « Null Byte :: WonderHowTo
Advanced Nmap: Top 5 Intrusive Nmap Scripts Hackers & Pentesters Should Know « Null Byte :: WonderHowTo
Top 32 Nmap Command Examples For Linux Sys/Network Admins - nixCraft
Nmap Cheat Sheet
20 Awesome Nmap Command Examples - ShellHacks
what scanning tools are unlikely to set off network IDS? - Information Security Stack Exchange
Nmap Cheat Sheet v1.1 - NmapCheatSheetv1.1.pdf
Nmap Cheat Sheet and Pro Tips | HackerTarget.com
Scan Your Home Network With Nmap | -sP argument

Ethical Hacking: Scanning Networks | Pluralsight
Scanning Networks in Ethical Hacking, Port Scanning and Network Scanning
NMapGUI - Advanced Graphical User Interface for NMap - KitPloit - PenTest Tools for your Security Arsenal ☣
CyberScan - Tool To Analyse Packets, Decoding , Scanning Ports, And Geolocation - KitPloit - PenTest Tools for your Security Arsenal ☣
VHostScan - Virtual Host Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
How to create port scanner using C programming language - Coding Security
scan home network at DuckDuckGo
GitHub - urbanadventurer/WhatWeb: Next generation web scanner
Home - Arachni - Web Application Security Scanner Framework
Wapiti : a Free and Open-Source web-application vulnerability scanner in Python for Windows, Linux, BSD, OSX
An Introduction to HTTP Fingerprinting
Hack Like a Pro: How to Fingerprint Web Servers Using Httprint « Null Byte :: WonderHowTo
Nikto, NMap , Skipfish and friends – VulPoint
Hack Like a Pro: How to Scan the Internet for Heartbleed Vulnerabilities « Null Byte :: WonderHowTo

TLS_Assessment

Generate Mozilla Security Recommended Web Server Configuration Files
SSL Server Rating Guide · ssllabs/research Wiki · GitHub
SSL Checker - Check server TLS/SSL setup and vulnerabilities
Qualys SSL Labs

Uncovering_Zero_Days

Code_Analysis

Native_Code_Analysis

Csmith
Finding and Understanding Bugs in C Compilers - csmith - pldi11-preprint.pdf
ibm purify at DuckDuckGo
microsoft app verifier at DuckDuckGo
insure plus plus at DuckDuckGo
valgrind at DuckDuckGo

AddressSanitizer · google/sanitizers Wiki · GitHub
AddressSanitizer — Clang 8 documentation
The Art of 0-Day Vulnerabilities, Part 1: STATIC ANALYSIS « Null Byte :: WonderHowTo
AddressSanitizer - ASan - Wikipedia

Fuzzing_Theory_and_Practice

g cppcon fuzzy testing at DuckDuckGo
GitHub - secfigo/Awesome-Fuzzing: A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause an
Fuzzing - Fuzz Testing
fuzzing - How can I fuzz standalone applications? - Information Security Stack Exchange
appsec - Where can I find a solid BURP tutorial? - Information Security Stack Exchange
Part 4: Fuzz testing techniques: unfuzzing the fuzzing - YouTube
Burp suite - Wikipedia
afl-unicorn: Part 2 — Fuzzing the ‘Unfuzzable’ – Hacker Noon
Practical fuzzing for pentesters (W34) - Pentestmag
Machine learning for effective fuzzing - CloudFuzz - payatu
Simple IMAP Fuzzer - Metasploit Unleashed
Hacker Lexicon: What Is Fuzzing?
The Art of 0-Day Vulnerabilities, Part2: Manually Fuzzing « Null Byte :: WonderHowTo
OWASP Testing Guide Appendix C: Fuzz Vectors - OWASP

Vulnerabilities_Underground_Markets

A Spyware Company Audaciously Offers ‘Cyber Nukes’ - Motherboard
How a Tiny Startup Became the Most Important Hacking Shop You’ve Never Heard Of - Motherboard
Vulnerabilities Dark Market - Hacking As A Service -russian-underground-101.pdf
Market for zero-day exploits - vulnerability markets

Responsible_Disclosure

Responsible Vulnerability Disclosure Process - RFC - draft-christey-wysopal-vuln-disclosure-00 -

Vulnerability (computing) - security - attack surface
Vulnerability assessment - Wikipedia
Category:Vulnerability - OWASP
CWE - Common Weakness Enumeration
Vulnerability Search Databases
Why Do Multiple CyberSecurity Researchers Suddenly Discover The Same Vulnerabilities After So Many Years - Joseph Steinberg
PenTest: Notorious Netcat - Pentestmag - SQL injection - Buffer overflow - HTTPS Attack -
CVE security vulnerability database. Security vulnerabilities, exploits, references and more - CVSS
NVD - national vulnerbaility databse NIST - National Insitute for Standard and Technology - Home
materials/web-extension at master · paper-materials-crowd-sourced/materials · vulnerabilities spotting browser extension - vulnerability assessment
Copying code from Stack Overflow? You might paste security vulnerabilities, too - vulnerability assessment

Network_Enumeration

Network enumeration - Wikipedia
What is Enumeration?
Enumeration Phase in Ethical Hacking
Subfinder - Subdomain Discovery Tool That Can Discover Massive Amounts Of Valid Subdomains For Any Target - KitPloit - PenTest Tools for your Security Arsenal ☣
GitHub - Ice3man543/subfinder: SubFinder is a subdomain discovery tool that can discover massive amounts of valid subdomains for any target. It has a simple modular architecture and has been aimed as a successor to sublist3r project.
DNS tools | Manage Monitor Analyze | DNSstuff
scan home network nmap at DuckDuckGo
nmap - How to find live hosts on my network? - Information Security Stack Exchange
GitHub - utiso/senf: sensitive number finder
Whois Lookup Captcha

Reconnaissance - Application Security Wiki
Hack Like a Pro: How to Use Netcat, the Swiss Army Knife of Hacking Tools - definitive guide - create backdoor - « Null Byte :: WonderHowTo
subjack - Hostile Subdomain Takeover tool written in Go - KitPloit - PenTest Tools for your Security Arsenal ☣
Hack Like a Pro: How to Conduct Active Reconnaissance on Your Target with hping3 « Null Byte :: WonderHowTo
Hack Like a Pro: Abusing DNS for Reconnaissance « Null Byte :: WonderHowTo
Hack Like a Pro: How to Exploit SNMP for Reconnaissance « Null Byte :: WonderHowTo
New Tool Automatically Finds and Hacks Vulnerable Internet-Connected Devices - Motherboard
penetration test - What is the difference between active reconnaissance and scanning/enumeration - Information Security Stack Exchange
GitHub - fuzzdb-project/fuzzdb: Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
Web Application finger printing - Anant Shrivastava
GitHub - aboul3la/Sublist3r: Fast subdomains enumeration tool for penetration testers
Intrigue-Core - Discover Your Attack Surface - KitPloit - PenTest Tools for your Security Arsenal ☣
Domain Analyzer - Analyze The Security Of Any Domain By Finding All the Information Possible - KitPloit - PenTest Tools for your Security Arsenal ☣

Recon « Null Byte :: WonderHowTo
Hack Like a Pro: Reconnaissance with Recon-Ng, Part 1 (Getting Started) « Null Byte :: WonderHowTo
Foot printing and Reconnaissance Tutorial
Intelligence Gathering - The Penetration Testing Execution Standard
Ethical Hacking: Reconnaissance/Footprinting | Pluralsight
Performing and Analyzing Network Reconnaissance | Pluralsight
Top 20 Data Reconnaissance and Intel Gathering Tools
D0xk1t - Web-based OSINT and Active Reconaissance Suite - KitPloit - PenTest Tools for your Security Arsenal ☣
Techniques: PRE-ATT&CK - MITRE ATT&CK - information gathering, reconnaissance techniques, OSINT,active/passive scanning -capabilities hackers must have - malware spreading distribution - OPSEC

Exploitation-Gaining_Access

Evading_Detection

Malware_Scanning

Operator of VirusTotal Like Malware-Scanning Service Jailed for 14 Years

New AI system DARKMENTION will detect upcoming cyberattacks from dark web
Munin - Online Hash Checker For Virustotal And Other Services - KitPloit - PenTest Tools for your Security Arsenal ☣
Malware has no trouble hiding and bypassing macOS user warnings – Ars Technica
Hacker gets a whopping 14 years in prison for running Scan4You service | ZDNet
ZombieBoy cryptomining malware exploits CVEs to evade detection
Linux kernel 3+ system call table modification detection - Information Security Stack Exchange

Covering_Tracks

how to remotely delete rootkit from target machine - Google Search
how to remotely delete rootkit from target machine - Google Search
Invoke-Phant0m - Windows Event Log Killer - KitPloit - PenTest Tools for your Security Arsenal ☣
Log Killer - Clear All Your Logs In (Linux/Windows) Servers - KitPloit - PenTest Tools for your Security Arsenal ☣

Evading AV Software « Null Byte :: WonderHowTo
Hacking Windows 10: How to Create an Undetectable Payload, Part 1 (Bypassing Antivirus Software) « Null Byte :: WonderHowTo
Dr0p1t-Framework 1.3.2.1 - A Framework That Creates An Advanced FUD Dropper With Some Tricks - KitPloit - PenTest Tools for your Security Arsenal ☣
Malware detection in 9 easy steps | CSO Online
Stuxnet-style code signing is more widespread than anyone thought | Ars Technica
The Rise of Super-Stealthy Digitally Signed Malware—Thanks to the Dark Web
How you can detect hackers in your encrypted traffic
Intrusion detection system - Wikipedia
Suricata tool is an open source network IDS- interview with Victor Julien - Pentestmag
Process Doppelgänging: New Malware Evasion Technique Works On All Windows Versions
The Anti-Malware Guide: 9 Virus Removal Tips And Tricks - GameSpot
AVGater Malware uses Antivirus to infect host
Antivirus tools are not good enough, says Google’s senior security engineer » TechWorm
Cisco's new tool will detect malware in encrypted traffic
Malware Analysis For Hedgehogs
GitHub - LordNoteworthy/al-khaser: Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
Tutorial: Creating Yara Rules for Malware Detection — PoC || GTFO
GitHub - Eitenne/TopHat: Fully undetected backdoor with RSA Encrypted shell
Evading Anti-virus Part 1: Infecting EXEs with Shellter
42250-how-to-write-fully-undetectable-malware---english-translation.pdf
inside-scan4you-takedown
First-Ever Ransomware Found Using ‘Process Doppelgänging’ Attack to Evade Detection
Intel Processors Now Allows Antivirus to Use Built-in GPUs for Malware Scanning
Detection of Intrusions and Malware, and Vulnerability Assessment | SpringerLink

Answer - Quora
red team how to succeed by thinking like the enemy pdf - Google Search
Telegram Vulners Bot - Exploit Search Engine And Security Feed In Your Pocket - KitPloit - PenTest Tools for your Security Arsenal ☣
Getsploit v0.2.2 - Command Line Utility For Searching And Downloading Exploits - KitPloit - PenTest Tools for your Security Arsenal ☣

Cryptography_Protocols-Cryptanalysis

Fundamentals

Cloudflare Embraces Google Roughtime, Giving Internet Security a Boost | WIRED
Why You Don't Roll Your Own Crypto - Motherboard
What is NIST's guidance on lightweight cryptography?
difference password cryptographic key at DuckDuckGo
Information-theoretic/Unconditional/Provable/Unbreakable security - Perfect Security/Secrecy is a special case - OTP One Time Pad - Claude Shannon - quantum cryptography

Building_Cryptographic_Primitives

Hidden in Plain Sight - Public Key Crypto - Nick Desaulniers
All Your base64 are Different To Us - CodeProject
SharpPrivacy - OpenPGP for C# - CodeProject
A Beginner's Tutorial for Understanding and Implementing Password Hashing and Salting - CodeProject

TLS-HTTPS

Attacks_On_TLS

tls - How to audit web servers for resistance/vulnerability to BREACH - Information Security Stack Exchange
ROBOT Attack: 19-Year-Old Bleichenbacher Attack On Encrypted Web Reintroduced
I, Robot? Aiiiee, ROBOT! RSA TLS crypto attack pwns Facebook, PayPal, 27 of 100 top domains • The Register
tls - Tools to test for BEAST/CRIME that AREN'T Internet-based? - Information Security Stack Exchange
TLS breach attack - Acunetix
The Breach Attack
Defending against the BREACH Attack | Qualys Blog
SSL/TLS attacks: Part 3 – BREACH Attack - Checkmate
SSL/TLS attacks: Part 1 – BEAST Attack - Checkmate
GitHub - dionyziz/rupture: A framework for BREACH and other compression-based crypto attacks

How to Disable WPAD on Your PC So Your HTTPS Traffic Won't Be Vulnerable to the Latest SSL Attack « Null Byte :: WonderHowTo
What Every Developer Must Know About HTTPS | Pluralsight
Session Hijacking, why SSL doesn't always mean secure
is possible to mitm https - Google Search
HTTPS Certificate Revocation is broken, and it’s time for some new tools | Ars Technica
SSL spy boxes on your network getting you down? But wait, here's an IETF draft to fix that • The Register
Nope, this isn’t the HTTPS-validated Stripe website you think it is | Ars Technica
Brief(ish) explanation of how https works
Mixed content blocking in Firefox | Firefox Help
SSL: "point to point security" vs "end to end security"? - Server Fault
What's the difference between end-to-end and regular TLS encryption? HTTPS - verifiable, S/MIME
Transport Layer Security - TLS, SSL - Secure Network Programming SNP
Secure Network Programming - SSL

PGP

Researchers Crack 1024-bit RSA Encryption in GnuPG Crypto Library
GnuPG Flaw in Encryption Tools Lets Attackers Spoof Anyone's Signature
Decade-old Efail flaws can leak plaintext of PGP- and S/MIME-encrypted emails | Ars Technica
EFail: Encrypted Email Has a Major, Divisive Flaw | WIRED
PGP and S/MIME protected emails prone to exposure
Here's How eFail Attack Works Against PGP and S/MIME Encrypted Emails

SSH

LibSSH Flaw Allows Hackers to Take Over Servers Without Password
Multiple Ways to Secure SSH Port
Wikileaks Unveils CIA Implants that Steal SSH Credentials from Windows & Linux PCs
How I’ve captured all passwords trying to ssh into my server!
Understanding the SSH Encryption and Connection Process - definitive guide - definitive
How to Limit SSH Users to RSYNC and SCP using RSSH | Linux Support in Adelaide & Melbourne - rssh - ssh server
ssh-agent forwarding and sudo to another user - Defaults env_keep+=SSH_AUTH_SOCK - keeping environment variable whith sudo - sudoers file

Breaking_Hashes

Hashing

Salts

encryption - Can you help me understand what a cryptographic "salt" is? - Cryptography Stack Exchange

What is a hash?
security - Difference between Hashing a Password and Encrypting it - Stack Overflow

Piece_Wise_Hashing

piecewise hash at DuckDuckGo
fuzzy hashes at DuckDuckGo
piecewise hash vs fuzzy hash at DuckDuckGo
Piecewise hashing - ForensicsWiki
Context Triggered Piecewise Hashing - ForensicsWiki
c - What is benefit to use context trigger piecewise hashing over traditional piecewise hashing? - Stack Overflow
Piecewise hashing - ForensicsWiki

How to decode password hash using CPU and GPU - Coding Security
Hashcat v4.0 - World's Fastest and Most Advanced Password Recovery Utility - KitPloit - PenTest Tools for your Security Arsenal ☣
Hashcat 4.0.0 now can crack passwords and salts up to length 256Security Affairs
Hate_Crack - Automated Hash Cracking Techniques with HashCat - KitPloit - PenTest Tools for your Security Arsenal ☣

Data_Integrity

Digital_Signature

How to Use an SHA-256 Hash to Verify Your Downloads Haven't Been Modified « Null Byte :: WonderHowTo
On the insecurity of math.random and it’s siblings – Insinuator.net

Digital_Certificates

Abusing X.509 Digital Certificates to establish a covert data exchange channelSecurity Affairs
The Market of Stolen Code-Signing Certificates Is Too Expensive for Most Hackers

Steganography

GitHub - RobinDavid/LSB-Steganography: Python program to steganography files into images using the Least Significant Bit.

Cryptolinguistics

What language did Native American use in WW2? - Quora
What Native American Language Did the US Military Use as an Unbreakable Code During WWII? | Synonym
World War I’s Native American Code Talkers - HISTORY
Is it true that without the Rosetta Stone we would've never been able to decipher hieroglyphics? Why? - askscience
if_we_had_never_discovered_the_rosetta_stone
Cryptolinguistics: If the Rosetta Stone had never been discovered, would computers now be able to decipher ancient Egyptian hieroglyphs? - Quora
How were the Hieroglyphics deciphered? - Quora

WindsorGreen : les plans de la NSA pour casser les chiffrements auraient été découverts en libre accès sur Internet, par un chercheur en sécurité
tls - Does hashing a file from an unsigned website give a false sense of security? - Information Security Stack Exchange
ubuntu - How does apt-get checks for the integrity of the files downloaded? - Super User
IEEE P1735 Encryption Is Broken—Flaws Allow Intellectual Property Theft
Millions of high-security crypto keys crippled by newly discovered flaw | Ars Technica
Flaw crippling millions of crypto keys is worse than first disclosed | Ars Technica
'Crypto Anchors' Might Stop the Next Equifax-Style Megabreach | WIRED
PenTest: Cryptography for pentesters - Pentestmag
Cryptanalysis for pentesters (W39) - Pentestmag
Shellcode: Encryption Algorithms in ARM Assembly | modexp
ROT-13 Online Encryptor & Decryptor
An introduction to cryptography and public key infrastructure | Opensource.com
Cryptography – Practical Networking .net

Off-The-Records_Messaging_Protocol

OTR.im - Whispering Off The Record
Internet Relay Chat (IRC) with Off the Record (OTR) Encryption
Off-the-Record Messaging - OTR - forward secrecy , malleable/deniable encryption - Pidgin, Kopete
IRC with SSL and OTR encryption – /INPUT/IS/EVIL/
Off-the-Record Messaging
Off-the-Record Communication,or, Why Not To Use PGP
tls - Is there any advantage on using OTR in a messaging app if the messages are first sent to a REST API server over HTTPS? TLS/SSL
Off The Record - what it is and why we recommend it for communications security | The Calyx Institute

Link encryption - vs End to End Encryption vs Bulk Encryption
Multiple encryption - aka cascade encryption, cascade ciphering, multiple encryption, and superencipherment. Superencryption refers to the outer-level encryption of a multiple encryption
End-to-end encryption - E2EE - MitM, endpoint security, backdoors
End-to-end email encryption. What is it and how does it work?
End-to-end encryption vs link encryption
Simple Authentication and Security Layer - complement to SASL
Instant Messaging Security - privacy, anonymity - OTR encryption, TLS - Adium, Pidgin, Digsby - XMPP

Breaking_Authentification

Authentication_Schemes

FaceId_Auth

Why Cops Can Use Face ID to Unlock Your iPhone | WIRED

HTTP_basic_access_authentication

Basic access authentication - HTTP-authentication - Wikipedia
How to set-up HTTP Authentication (Basic) with Nginx on Ubuntu 16.04 - Acunetix

MultiFactor_Auth

This Tool Can Hack Your Accounts Even with Two-Factor Authentication - ExtremeTech
You Should Be Using Two-Factor Authentication on Everything - Motherboard
Why mobile two-factor authentication is better than biometrics
What is Two Factor Authentication (2FA) And Why Use It?
How does Google Authenticator work? - HOTP HMAC based OTP, TOTP Time based OTP
Two-Factor Authentication for Beginners - Apps

Password_Managers

Google's New Smart Lock Is the Password Manager for the Rest of Us
What's the difference between OpenID and OAuth? - Stack Overflow
How Password Managers Work And Why You Should Use One - Motherboard
Best Password Manager — For Windows, Linux, Mac, Android, iOS and Enterprise
Open source alternatives to LastPass | Opensource.com

Fingerprint_Scan_Auth

How do fingerprint scanners work - Explain that Stuff
Apple’s Secure Enclave Processor (SEP) Firmware Decrypted | Hackaday

Pattern_Locks

How To Unlock Pattern Lock On Android Phone (3 Ways) – Incognisys

Auth0

Authentication Bypass Vulnerability Found in Auth0 Identity Platform

Authentication Cheat Sheet - OWASP
How to Protect Your Digital Self: 2FA, Password Managers, Safe Browsing | WIRED
Est-il préférable ou non de permettre aux internautes de coller leurs mots de passe lorsqu'ils s'authentifient ?
What Is Two-Factor Authentication and Why You Should Use It - Motherboard
how to hack accounts protected with 2 fa - Google Search
Cardiac Scan Authentication — Your Heart As Your Password
Plug The Security Holes In Your Two-Factor Authentication
Do you use SMS for two-step verification? Don't. - CNET
Two-Step vs. Two-Factor Authentication - Is there a difference? - Information Security Stack Exchange
Multi-factor authentication - Wikipedia
Multi-Factor Authentication vs Two Step Verification. - QuickBooks Learn & Support
Hackers Show Proofs of Concept to Beat Hardware-Based 2FA - Motherboard
Synthetic, Microscopic Fingerprints Turn Tiny Plastic Particles Into Security Keys
What is OpenID? | OpenID
Effects of Biometrics Co-Used with Password - Pentestmag
How to Build an FTP Password Cracker with Ruby
security-risks-of-logging-in-with-facebook
security - The definitive guide to form-based website authentication - Stack Overflow

Credentials_Retrieval_and_Storage_in_Software

Storing private asymmetric key in application binary? - Information Security Stack Exchange
How should an application store its credentials - Information Security Stack Exchange
How can I secure the secret key? - Information Security Stack Exchange
What's more secure? Hard coding credentials or storing them in a database? - Information Security Stack Exchange
Is it safe to store a password in compiled code? - Information Security Stack Exchange
Hiding a password in a python script (insecure obfuscation only) - Stack Overflow
How to Use Encrypted password in shell script AIX - Unix & Linux Stack Exchange
How do I hide my mySQL login info in my php script? - Stack Overflow
Encrypt passwords in powershell scripts - Virtual to the Core
Can a script be executable but not readable? - Unix & Linux Stack Exchange
How can I avoid putting the database password in a perl script? - Information Security Stack Exchange
Password Discovery and Patching by Disassembling: Explained
Architecture - Vault by HashiCorp
Is storing passwords associated with system processes and binaries in an encoded format acceptable? - Information Security Stack Exchange
How to avoid scripts with hardcoded password? - Information Security Stack Exchange
Best practice for storing credential in data center - Information Security Stack Exchange
Best practices for storing credentials used by code - config file password vs encrypted password with hidden encryption key Information Security Stack Exchange
Securely store passwords in a mobile application - Information Security Stack Exchange

Passwords_Sharing_Risks

IT will only give password over phone - but is that really more secure than email? - Information Security Stack Exchange

Mimikatz-like_Tools

how does mimikatz work - Google Search
Open Security Research: Using Mimikatz to Dump Passwords!
How to Steal Windows Credentials with Mimikatz and Metasploit
Defending Against Mimikatz | Jim Shaver
gentilkiwi/mimikatz: A little tool to play with Windows security

Password_Strength

Password strength - Wikipedia
Why you can’t trust password strength meters – Naked Security
Is it acceptable practice to only increment a number when changing a password? - Information Security Stack Exchange
Why Multi-word Phrases Make for More Secure Passwords Than Incomprehensible Gibberish
The Only Secure Password Is the One You Can’t Remember
Troy Hunt: How Long is Long Enough? Minimum Password Lengths by the World's Top Sites
A brief history of bad passwords | Opensource.com
Why So Many People Make Their Password 'Dragon' | WIRED

Password_Locked_Resources

How secure a secured PDF really is? - Information Security Stack Exchange
What security scheme is used by PDF password encryption, and why is it so weak? - Information Security Stack Exchange
password locked pdfs how secure site:security.stackexchange.com at DuckDuckGo
password locked file how secure site:security.stackexchange.com at DuckDuckGo
encryption - How secure is a password protected file? - Information Security Stack Exchange
How good is PDF password protection? - Super User
PDFCrack | How to Crack Password of PDF Files?
Cracking Password Protected .PDF Files with John The Ripper – Netlock Security
Recover Lost PDF Passwords with pdfcrack (Linux)
Linux / FreeBSD: PDFCrack A Command Line Password Recovery Tool For PDF Files - nixCraft

pwned - A command-line tool for querying the 'Have I been pwned?' service - KitPloit - PenTest Tools for your Security Arsenal ☣
how does local session password work - Google Search
Hack Like a Pro: How to Crack Passwords, Part 1 (Principles & Technologies) - Basics « Null Byte :: WonderHowTo
How Hackers Take Your Encrypted Passwords & Crack Them « Null Byte :: WonderHowTo
SpyEye - Wikipedia
Holy DUHK! Boffins name bug that could crack crypto wide open • The Register
DUHK Crypto Attack Recovers Encryption Keys, Exposes VPN Connections, More
How to crack password of zip files using python - Coding Security
Top 10 Password Cracking Techniques Used By Hackers
Brute-Forcing HTML Form Authentication Using Python
How to sniff password using Wireshark - Coding Security
How to break a CAPTCHA system in 15 minutes with Machine Learning
CAPTCHA - Wikipedia
Challenge–response authentication - Wikipedia
Replay attack - Wikipedia
New Tools Make Checking for Leaked Passwords a Lot Easier
Default Passwords | CIRT.net
Google as a password cracker | Light Blue Touchpaper
Le W3C publie une nouvelle norme d'authentification, qui permet de se connecter de manière sécurisée aux applications Web sans saisir de mots de passe
authentication - Is a redirect showing the password in plain text a security vulnerability? - Information Security Stack Exchange
What are the security risks of logging the hash of rejected passwords? - Information Security Stack Exchange
Password-Guessing Was Used to Hack Gentoo Linux Github Account
login bruteforcer
Cracking password in Kali Linux using John the Ripper - blackMORE Ops

Malware_Development

Virology-Theory_and_Practice

Is there a Linux virus? - Quora
Security warning: Attackers are using these five hacking tools to target you | ZDNet
New Malware Combines Ransomware, Coin Mining and Botnet Features in One
Cryptovirology - use of cryptography in malware development - Wikipedia
How to make a simple computer virus in Python - Coding Security
virus vs worm - Google Search
How to program a virus in c++ - Coding Security
Ethical Hacking: Malware Threats | Pluralsight
how to know if cracked program contains malicious code - Google Search
eric filiol - Google Scholar

Hooking - Wikipedia
Zero-day (computing) - Wikipedia
Exploit Development
Exploit Building « Null Byte :: WonderHowTo
exploit vs malware - Google Search
How to Create a Metasploit Exploit in Few Minutes « Null Byte :: WonderHowTo
Hack Like a Pro: How to Build Your Own Exploits, Part 3 (Fuzzing with Spike to Find Overflows) « Null Byte :: WonderHowTo
python vs ruby hacking - Google Search
How to Use MinGW to Compile Windows Exploits on Kali Linux « Null Byte :: WonderHowTo
Biohackers Encoded Malware in a Strand of DNA | WIRED
Cisco's Talos Intelligence Group Blog: Vulnerability Walkthrough: 7zip CVE-2016-2334 HFS+ Code Execution Vulnerability
New Malware Family Uses Custom UDP Protocol for C&C Communications

Sandboxing

SandboxEscaper - Vulnerability Researcher: How to escape sandboxes without technical skills

Binary_Exploitation

Remote_Code_Execution

Critical Flaw Found in Streaming Library Used by VLC and Other Media Players

Code_Injection

.NET Process Injection | Tim MalcomVetter | LinkedIn
sRDI - Shellcode Implementation Of Reflective DLL Injection - KitPloit - PenTest Tools for your Security Arsenal ☣
How to Use Command Injection to Pop a Reverse Shell on a Web Server « Null Byte :: WonderHowTo
OWASP Testing Guide Appendix D: Encoded Injection - OWASP

Memory_Based_Attacks

Buffer_Overflow

Advanced Exploitation: How to Find & Write a Buffer Overflow Exploit for a Network Service « Null Byte :: WonderHowTo
Buffer overflow/overrun - Wikipedia
Buffer-Overflow Vulnerability Lab
Integer Undefined Behaviors in Open Source Crypto Libraries – integer overflow - Embedded in Academia
Understanding_Integer_Overflow_in_C-Cpp.pdf
Stack buffer overflow/overrun - stack smashing - protection schemes : stack canaries, nonexecutable stack, randomization ASLR - Famous malware examples taking advantage of stack buffer overflow - Wikipedia
NOP-Slides buffer overflow exploits. at DuckDuckGo
c - How to overflow a float? - Stack Overflow
Buffer Overflow Exploits | Gaining Access to Target Systems Using Application and Operating System Attacks | InformIT
The details of C function stack (and heap) operation when function call is made (caller) and returned (callee) on personal computers
The buffer overflow hands-on tutorial using C programming language on Linux/Unix platforms and Intel microprocessor architecture with C code samples and tons of illustrations
Teaching Stack Overflow
Attack on Stack [Part 1]; Smash the Stack Visualization: Introduction to Memory, Registers and Assembly. « Null Byte :: WonderHowTo
Buffer-Overflow Vulnerabilities and Attacks
A hands-on tutorial on the stack-based buffer overflow problem, threats, vulnerability and exploit from the source to the consequences
Integer overflow - vs saturation vs wrap around - buffer overflow security risk - Integer overflow exception handling in various programming languages - Wikipedia
Saturation arithmetic - integer saturation/overflow in CPUs vs wrap-around in modular arithmetic - Wikipedia
Aliasing (computing) - buffer overflows - aliasing analysers
Stack overflow - recursion
Heap overflow/overrun - Wikipedia
Intel® Memory Protection Extensions Enabling Guide | Buffer Overflow protection - Denial Of Service
interchanging signed/unsigned numbers can lead to security bugs - overwrite Program Counter PC/Instruction Pointer EIP/RIP on the stack - stack based buffer overflow

stack pivot binary exploitation at DuckDuckGo
Exploit Mitigation Techniques - Data Execution Prevention (DEP) - Linux - 0x00sec - The Home of the Hacker
Exploit Mitigation Techniques - Stack Canaries - Exploit Development - 0x00sec - The Home of the Hacker
Exploit Mitigation Techniques - Address Space Layout Randomization (ASLR) - Exploit Development - 0x00sec - The Home of the Hacker
BOVSTT - Buffer Overflow Vulnerability Services Tester Tool - Hakin9 - IT Security Magazine
C0:7E:01:8C:93:EB:D0:FD:E3:CD:74:32:9F:AF:FA:6F:40:FD:8E:1C:05:E3:79:41:6C:77:CD:EF:3E:04:11:12: Simplified Buffer Overflow Exploit Development (Part 1)
The Web Application Security Consortium / Null Byte Injection
CWE - CWE-242: Use of Inherently Dangerous Function (3.1)
Unicode Security Guide
Uncontrolled format string attack - Wikipedia
Hacker Curriculum - ELF exploitation and infection
Format String Vulnerabilities | Development & Security
abatchy's blog | [Kernel Exploitation] 6: NULL pointer dereference
Memory protection - segmentation, paged virtual memory, protection keys, simulated segmentation, dynamic tainting - capability based tainting
Protection ring - hierarchical protection domains - vs capability-based security
It’s Time to Get Serious About Exploiting Undefined Behavior – security - secure coding
Intra-Process Memory Protection for Applications on ARM and x86: Leveraging the ELF ABI - security
Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory - memory disclosure attack
security - How does the kernel prevent a malicious program from reading all of physical RAM? MMU - signals, swap space
More Software Vulnerabilities and Defenses - secure coding - Stack Smashing Attacks/Defenses - argument validation - Manual Memory/storage Management : dangling pointer, memory leak, garbage collection, static type system, dynamic code analysis, type safety, memory safety,
Is divide-by-zero a security vulnerability? secure coding - Information Security Stack Exchange
c - Memcpy() in secure programming? secure coding - microsoft alternatives - buffer overflow
INT30-C. Ensure that unsigned integer operations do not wrap -
DCL09-C. Declare functions that return errno with a return type of errno_t - C11 secure coding Annex K
Signed vs. unsigned integers for lengths/counts - integer overflow, wrap, size_t, UINT_MAX

Building_Options_To_Preventing_Exploitation

What is the most hardened set of options for GCC compiling C/C++? - Information Security Stack Exchange
security compilation flags gcc at DuckDuckGo
Useful GCC flags to improve security of your programs? - Stack Overflow
security - How to test whether a Linux binary was compiled as position independent code? - Unix & Linux Stack Exchange
Binary and Kernel Hardening - Debian Wiki
Recommended compiler and linker flags for GCC - RHD Blog
shared libraries - What does the -fPIC compilation flag does? - Stack Overflow

Modern Binary Exploitation - RPISEC Spring 2015
GitHub - Zer0Mem0ry/Detour: A simple project to demonstrate function hooking / detouring
APIHook
Function Hooking Part I: Hooking Shared Library Function Calls in Linux
API Hooking with Microsoft Detours
x86 API Hooking Demystified | Development & Security
Improper input validation - Wikipedia
Can you write a piece of code that is susceptible to be hacked and then demonstrate how a hacker would hack it? - Quora
aslr memory mitigation at DuckDuckGo

Malware_Spreading_Methods

Employee infects US govt network with malware after visiting 9,000 porn sites
Malware Distributors Adopt DKIM to Bypass Mail Filters
Fake Adobe Flash Installers Come With a Little Malware Bonus | WIRED
Schneider Electric may have shipped USB drives infested with malware | ZDNet
is it possible to get infected only by visiting a website at DuckDuckGo
Google Search Results Exploited to Distribute Zeus Panda Banking Trojan
Warning: CCleaner Hacked to Distribute Malware; Over 2.3 Million Users Infected
Hackers Are Distributing Backdoored 'Cobian RAT' Hacking tool For Free
Beware of Windows/MacOS/Linux Virus Spreading Through Facebook Messenger
it's it possible that torrented movies hide malware at DuckDuckGo
Hackers spread Android spyware through Facebook using Fake profiles
Fake Chrome & Firefox browser update lead users to malware infection
Inside the Unnerving CCleaner Supply Chain Attack | WIRED
CCleaner Attack Timeline—Here's How Hackers Infected 2.3 Million PCs
Cybercriminals Hijack Router DNS to Distribute Android Banking Trojan
Thousands of hacked websites are infecting visitors with malware | Ars Technica
How a USB could become security risk for your device
Malicious Software Packages Found On Arch Linux User Repository

Office_Automation_Files_As_Attack_Vectors

Unpatched MS Word Flaw Could Allow Hackers to Infect Your Computer

PDF_Files_Exploitation

malware - Can a PDF file contain a virus? - Information Security Stack Exchange
Two Critical Zero-Day Flaws Disclosed in Foxit PDF Reader
Utiliser un PDF pour pirater votre boss comme un nul(l) | Pirater comme un nul(l)
Bad-Pdf - Steal NTLM Hashes With A PDF From Windows Machines - KitPloit - PenTest Tools for your Security Arsenal ☣

Office VBA + AMSI: Parting the veil on malicious macros - Microsoft Secure
'Father of Zeus' Kronos malware exploits Office bug to hijack your bank account | ZDNet
New Microsoft Word attacks infect PCs sans macros | Ars Technica
17-Year-Old MS Office Flaw Lets Hackers Install Malware Without User Interaction
MS Office Built-In Feature Could be Exploited to Create Self-Replicating Malware
How Just Opening A Malicious PowerPoint File Could Compromise Your PC
SophosLabs analysis: why the surge in Word docs hiding ransomware? – Naked Security
Office DDE attack works in Outlook too – here’s what to do – Naked Security
Hackers Exploit Recently Disclosed Microsoft Office Bug to Backdoor PCs
MS Office Built-In Feature Could be Exploited to Create Self-Replicating Malware
Microsoft Outlook issue fixed - BBC News
MS Office’ Default Function Can Be Used to Create Self-Replicating Malware
Attack by TIFF images: What are the vulnerabilities in LibTIFF?
Ransomware hidden inside a Word document that’s hidden inside a PDF – Naked Security
18-Byte ImageMagick Hack Could Have Leaked Images From Yahoo Mail Server
Microsoft Disables DDE Feature in Word to Prevent Further Malware Attacks
Hackers Found Using A New Way to Bypass Microsoft Office 365 Safe Links

Category:Attack - OWASP
Exploit (computer security) - Wikipedia
Metasploit Basics « Null Byte :: WonderHowTo
Hack Like a Pro: How to Find Exploits Using the Exploit Database in Kali « Null Byte :: WonderHowTo
GitHub - NullArray/AutoSploit: Automated Mass Exploiter
Exploiting System Shield AntiVirus Arbitrary Write Vulnerability using SeTakeOwnershipPrivilege | GreyHatHacker.NET
Threat or menace? “Autosploit” tool sparks fears of empowered “script kiddies” | Ars Technica
GitHub - micle-fm/Parat: Python based Remote Administration Tool(RAT)
There is a shell in your lunch-box by Rotimi Akinyele - Hakin9 - IT Security Magazine
Free Armitage Lesson
How we breached your network | Tim MalcomVetter | Pulse | LinkedIn
Attack Vector (malware) - Wikipedia
Attack surface - reduction

Post-Exploitation

SILENTTRINITY - A Post-Exploitation Agent Powered By Python, IronPython, C#/.NET - KitPloit - PenTest Tools for your Security Arsenal ☣

Privilege_Escalation

Intel Confirmed Critical Escalation of Privilege Vulnerability — Now What? « Null Byte :: WonderHowTo
Hack Like a Pro: How to Pivot from the Victim System to Own Every Computer on the Network « Null Byte :: WonderHowTo
hack how to turn a guest account into admin - Google Search
reverse | maK_it: Linux Rootkit
Ninja access to root privileges from userspace | maK_it: Linux Rootkit
Windows Privilege Escalation Guide
Linux Exploit Suggester - Linux Privilege Escalation Auditing Tool - KitPloit - PenTest Tools for your Security Arsenal ☣

Maintaining_Access

Listeners_And_Backdoors

GhostTunnel - A Covert Backdoor Transmission Method That Can Be Used In An Isolated Environment - KitPloit - PenTest Tools for your Security Arsenal ☣
rootkit vs trojan - Google Search
how to close remote backdoor on victim machine - Google Search
rootkit vs rat vs listener vs backdoor at DuckDuckGo
Listeners « Null Byte :: WonderHowTo
rootkit vs rat vs listener vs backdoor - Google Search
The Perfect Web Backdoor | pentestmonkey
Hack Like a Pro: How to Embed a Backdoor Connection in an Innocent-Looking PDF « Null Byte :: WonderHowTo
rootkit vs trojan - Google Search
how to close remote backdoor on victim machine - Google Search
Gazer: A New Backdoor Targets Ministries and Embassies Worldwide
Hackers Exploit Recently Disclosed Microsoft Office Bug to Backdoor PCs
Kaotic Creations: Backdooring Unix System via Cron - exploiting
How to Upload a Shell to a Web Server and Get Root (RFI): Part 1 « Null Byte :: WonderHowTo
Kaotic Creations: Backdooring Unix System via Cron

Ransomware-spreading hackers sneak in through RDP – Naked Security
Introduction to Trojans and Backdoors
How to Create a Reverse Shell to Remotely Execute Root Commands Over Any Open Port Using NetCat or BASH « Null Byte :: WonderHowTo
Reverse Shell Cheat Sheet
penetration test - Reverse shell back door - Information Security Stack Exchange
Shellcode - Reverse-Shell Wikipedia
Maintaining Access Part 1: Introduction and Metasploit Example

Manipulating-Extracting_Data

Answer - Quora

Keyloggers

Part 2: Stealing keyboard keys for fun & profit | maK_it: Linux Rootkit
Part 1: Stealing keyboard keys for fun & profit | maK_it: Linux Rootkit
benefits of keyloggers | PC Booster Blog
Hack Like a Pro: How to Remotely Install a Keylogger onto Your Girlfriend's Computer « Null Byte :: WonderHowTo
How to create a keylogger that runs in background using python - Coding Security
How to Use Kaspersky Virtual Keyboard Against Keylogger | IT Security Column
What are some advantages of a virtual keyboard? What are some disadvantages? - Quora
CrossRAT keylogging malware targets Linux, macOS & Windows PCs
Keystroke logging - Wikipedia

Don’t Fall for Webcam Blackmail: Here’s How to Protect Yourself

Ransomwares

How to Use the USB Rubber Ducky to Disable Antivirus Software & Install Ransomware « Null Byte :: WonderHowTo
GIBON Ransomware Being Distributued by Malspam
Paradise Ransomware Uses RSA Encryption to Encrypt Your Files
Decompiled SLocker Android Ransomware Source Code Published Online
Warning: Two Dangerous Ransomware Are Back – Protect Your Computers
New Fileless Ransomware with Code Injection Ability Detected in the Wild
Russian Hacker Selling Cheap Ransomware-as-a-Service On Dark Web
Hack Like a Pro: How to Secretly Hack Into, Switch On, & Watch Anyone's Webcam Remotely « Null Byte :: WonderHowTo
What is Ransomware and How Do I Protect Against It?

Hack Like a Pro: Creating a Virtually Undetectable Covert Channel with RECUB « Null Byte :: WonderHowTo
Hacking Windows 10: How to Remotely Record & Listen to the Microphone of a Hacked Computer « Null Byte :: WonderHowTo
Insecam - World biggest online cameras directory

Remote_Administration_Tools

DarkComet - Wikipedia
Dynamic DNS Update Client (DUC) for Windows - No-IP
Ultimate Guide to Setup DarkComet with NoIP
Setting up DarkComet - RAT 4 with NO - IP
How To Setup DarkComet 5.2, No-IP, & Port Forward
DarkComet RAT(Remote Administration Tool) Tutorial
DarkComet RAT Beginner Tutorial W/Port Forwarding and No-Ip - YouTube
DarkComet RAT Noob friendly tutorial ~ Indian Hacker's Colony
Darkcomet Info | How to setup darkcomet
Setup DarkComet-RAT with VPN | Darkcomet Info

EmpireProject/Empire: Empire is a PowerShell and Python post-exploitation agent.
Pupy - Opensource, Cross-Platform (Windows, Linux, OSX, Android) Remote Administration And Post-Exploitation Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
CertUtil.exe Could Allow Attackers To Download Malware While Bypassing AV

Security hacker - Wikipedia
Computer security - Wikipedia
PTES Technical Guidelines - The Penetration Testing Execution Standard
Penetration testing methodologies - OWASP definitive list - PTES, PCI, NIST 800-115 - ISSAF, OSSTMM, CREST
MITRE ATT&CK™
Vulnerability Assessment and Penetration Testing (VAPT) Services - Vulnerability Assessment & Penetration Testing (VAPT)
hack-like-pro-hacker-methodology null byte
Penetration Testing Framework 0.59
The Attacker’s Process | The Technical Foundations of Hacking | Pearson IT Certification
The Five Phases of Hacking « Null Byte :: WonderHowTo
Hacking methodology | CCNA Security
So...You Want to Be a Hacker? « Null Byte :: WonderHowTo
Ethical Hacking Study Guide
What is Hacking? Introduction & Types
How to Attack a Vulnerable Practice Computer: A Guide from Scan to Shell - SecGen - Enumeration with Nmap - « Null Byte :: WonderHowTo
[PentesterLab] Learn Web Penetration Testing: The Right Way
Ethical Hacking: Understanding Ethical Hacking | Pluralsight
Ethical Hacking: Penetration Testing | Pluralsight
Hack Like a Pro: How to Hack Like the NSA (Using Quantum Insert) « Null Byte :: WonderHowTo
The Ethical Hacking Framework
GitHub - D4Vinci/One-Lin3r: Gives you one-liners that aids in penetration testing operations
GitHub - NextronSystems/APTSimulator: A toolset to make a system look as if it was the victim of an APT attack
GitHub - x3omdax/PenBox: PenBox - A Penetration Testing Framework - The Tool With All The Tools , The Hacker's Repo
GitHub - ruped24/killchain: A unified console to perform the "kill chain" stages of attacks.
Huntpad - The Bug Hunter's Notepad - KitPloit - PenTest Tools for your Security Arsenal ☣
Pure Blood - A Penetration Testing Framework Created For Hackers / Pentester / Bug Hunter - KitPloit - PenTest Tools for your Security Arsenal ☣
Website security - keep in check with Acunetix
The Penetration Testing Execution Standard

Hackers_Jargon_And_Terminology

The Motherboard e-Glossary of Cyber Terms and Hacking Lingo - Motherboard
Jargon File Resources
Types of Hackers: Beginner Level Part -2 - Develope IT
Hacking guide for beginners Step by step
Hacker Dictionary: Beginner Level Part - 5 - Develope IT
Types of Hacking: Beginner Level Part -3 - Develope IT
All the Terms Of Hacking World You Should Know
How to Hack Wi-Fi: Getting Started with Terms & Technologies « Null Byte :: WonderHowTo
Cyber-attack glossary: What are malware, patches and worms? - BBC News
A DevSecOps Reference Guide 101 - Jargon - VA, PT, DAST, Parameterized DAST Scans, SAST, RASP, IAST, Fuzzing, Spidering, WAF, Webhook, Authentication, Authorization, Abuser Story, Tooling, Regression Testing, Exploit Scripts, Zero day, CVE, CVSS, CWE, CWSS, STRIDE, DREAD, OSSTMM, OSVD, OWASP ASVS, Vulnerability Management, Vulnerability Correlation

Skills-Learning_Curve

How to Start a Career in Cybersecurity: All You Need to Know
The Essential Skills to Becoming a Master Hacker « Null Byte :: WonderHowTo
A Hackers Advice & Tip: Choosing Your Path. Knowing Where to Learn & How to Learn It **Newbies Please Read** « Null Byte :: WonderHowTo
IT Skill Assessment
Hacking for Newbies « Null Byte :: WonderHowTo
How to Use Null Byte to Study to Become a Professional Hacker « Null Byte :: WonderHowTo
How to become a professional hacker (Step by Step Guide) - Coding Security
Problem Solving Is an Essential Hacker Skill « Null Byte :: WonderHowTo
codingsec.net/2016/05/becoming-an-ethical-hacker/
How to Become a Hacker « Null Byte :: WonderHowTo

Cheat_Sheets

GitHub - rmusser01/Cheatsheets: Penetration Testing/Security Cheatsheets
Penetration Testing Tools Cheat Sheet
Most Important Penetration Testing Cheat Sheet Linux Machine

Legal_Stuffs

The Legal Consequences of Hacking « Null Byte :: WonderHowTo
Is Reversing Legal? - Reverse engineering for beginners - Develope IT

Comprehensive_Courses

RPISEC

Home - RPISEC
Index of /courses
Security Group - RPISEC
overview for rpisec
Tweets by RPISEC (@RPISEC) – Twitter

Florida_State_University

2013

Offensive Security Home Page (CIS 4930 / CIS 5930) Spring 2013

Offensive Computer Security Home Page (CIS 4930 / CIS 5930) Spring 2014
Offensive Network Security: Home - academic course - Florida State University
Training for manipulating all kinds of things: Learning Exploitation with Offensive Computer Security 2.0 - fsu redwood, academic course

UCR

Schedule — CS 260 02, 2017 1 documentation
Schedule - Academic course - Malware Analysis, fuzzing, vulnerbaility detection - program verification - sandbox/SFI - firewalls, intrusion detection, Network security, Password security - Web security, server/client side attack - OS access control MAC - Chrome Browser Security, chrome sandbox

eBooks-Notes

Hacking, 2nd Edition The Art of Exploitation by Jon Erickson| No Starch Press
Hacking The Art of Exploitation - HAOE- reflexions, practice - Shichao's Notes

Introduction to Cybersecurity - Networking Academy
Metasploit Unleashed - Free Online Ethical Hacking Course
Index of /~cs342/fall08/handouts

Certifications-Majors

Majors

Florida_State_University

MS in Computer Science | Computer Science

Certs

Deal: Learn IT Security with This White Hat Hacker 2017 Bundle
7 Top Security Certifications You Should Have in 2017
CISSP vs CEH? Which IT Security Certifications are More Valuable? - Hakin9 - IT Security Magazine
2018 CompTIA Security Certification Bundle: Your 57-Hour Track To Pass IT Certification Exams
5 Proven Cyber Security Certifications That Will Skyrocket Your Salary
CEH Certification: Certified Ethical Hacking Certification
InfoSec Resources - IT Security Training & Resources by InfoSec Institute

Offensive_Security

OSCP

What are the best resources to study for the OSCP certification? - Updated
What are the pre-requisites for OSCP certification exam? - Quora
In the OSCP exam, how many machines do you have to root to pass the exam? - Quora
In the world of information security, is the OSCP a good certification to have? - Quora
Anyone out there on Quora who could share their experience taking OSCP exam? - Updated - Quora
Is OSCP certificate enough to work as a pen test in United States? | Information Security
Offensive Security Certified Professional (OSCP) Certification
Penetration Testing with Kali - Online Security Training
PWK Syllabus - penetration-testing-with-kali.pdf
OSCP: hautement addictif

OSCE

The Road to OSCE – David Valles – Medium
Offensive Security's CTP and OSCE - My Experience - Security SiftSecurity Sift
Path to OSCE - Course & Exam Review
OSCE - Cracking the Perimeter Experience
CTP/OSCE: LESSONS LEARNED | BYTESDARKLY

OffSec Certs - Are They Still Worth the Money? OSCP, OSCE, OSEE and OSWE- definitive review and criticism - Hack.Learn.Share
Offensive Security Certified Expert (OSCE) - vs OSCP comparison - Review
Offensive security certs: OSCP and OSCE review – Pau Muñoz
Any recommendation after OSCP other than OSCE? : oscp
What is the difference between an Offensive Security Certified Expert (OSCE) and an Offensive Security Certified Professional (OSCP)? Are they the same? - Quora
OSCE & CTP - The dreaded certification by Offensive Security - rootkit
The search for animal 0-day: Reviews for OSCP, OSCE, OSEE and Corelan Advanced Training
OSCE and Me - CTP course · OJ Reeves
Offensive Security: OSCP & OSCE — TechExams Community

Hacking_Labs

Hardware_equipment-DIY

How do USB killers work? - Quora
hardware for hacking 2017 - Google Search
Top 10 Best Laptop for Hacking in 2017 - For Hackers and IT Security Professionals - Sysprobs - Not Another Tech Blog
Buying a professional penetration testing laptop for 2017
Best Hacking Tools Of 2017 For Windows, Linux, And OS X
Product Review: Best Hacking Laptops for 2017 - YouTube
Minimum Requirements of a Laptop to Be Used for Hacking « Null Byte :: WonderHowTo
Surprising tips from a super-hacker | Computerworld
CIA Tools to Spy on Offline Computers with USB Drives Leaked - ExtremeTech
USB Hacker Arsenal » DarknessGate.com
How to Make an Auto Hacking Wardrive: 8 Steps
How hackers use USB sticks - Business Insider
Wickedly Clever USB Stick Installs a Backdoor on Locked PCs | WIRED
Top 5 USB Hacks that PWN You
best usb stick to install tails os - Google Search
panasonic toughbook | Hackaday
Panasonic rolls out new Toughbooks with Windows 7 and 16 hours of battery life | TechCrunch
What Are the Best Laptops for Hacking? - Quora
openwrt hacking - Google Search
How to Set Up a Headless Raspberry Pi Hacking Platform Running Kali Linux « Null Byte :: WonderHowTo
How to Build a Pumpkin Pi — The Rogue AP & MITM Framework That Fits in Your Pocket « Null Byte :: WonderHowTo
PoisonTap: This $5 Device Hacks A Locked Computer In Seconds
How to Select a Field-Tested Kali Linux Compatible Wireless Adapter « Null Byte :: WonderHowTo
How to Build a Portable Pen-Testing Pi Box « Null Byte :: WonderHowTo
Building Hacking Weapons With Raspberry Pi - Null Byte
SWORD dropbox: A $15 OpenWRT based DIY disposable pen-test tool.
How a Wi-Fi Pineapple Can Steal Your Data (And How to Protect Yourself From It) - Motherboard
Six Great DIY Projects for Hacking Computers and Networks
This USB Drive Will Self-Destruct After Ruining Your Computer | Hackaday
How to Build a Portable Hacking Station with a Raspberry Pi and Kali Linux
USB Stick with Heathrow Security and Queen' Data Found on London Street
Buyer's Guide: Top 20 Hacker Holiday Gifts for Christmas 2017 « Null Byte :: WonderHowTo
How to Hack Wi-Fi: Choosing a Wireless Adapter for Hacking « Null Byte :: WonderHowTo
how to make use of an old laptop hacking - Google Search
Buy the Best Wireless Network Adapter for Wi-Fi Hacking in 2017 « Null Byte :: WonderHowTo
How to Build a Beginner Hacking Kit with the Raspberry Pi 3 Model B+ « Null Byte :: WonderHowTo
Buy the Best Wireless Network Adapter for Wi-Fi Hacking in 2018 « Null Byte :: WonderHowTo
How to Install Kali Live on a USB Drive (With Persistence, Optional) « Null Byte :: WonderHowTo
How to Set Up Kali Linux on the New $10 Raspberry Pi Zero W « Null Byte :: WonderHowTo
DIY Pi Zero Pentesting Tool Keeps it Cheap | Hackaday
Battery Backup Conceals a Pentesting Pi | Hackaday

Security_Oriented_Platforms

Kali_Linux

Docs

Kali Linux
Kali Training
Kali Tools
Kali Docs
Kali Forums
NetHunter
Offensive Security
Exploit-DB
GHDB
MSFU

Advanced Package Management in Kali Linux | Kali Linux
Kali Linux Metapackages – Getting the missing tools properly. | GoAttack!
Run 'Kali Linux' Natively On Windows 10 — Just Like That!
Kali Linux Revealed | Mastering the Penetration Testing Distribution

BlackArch

Exploring Kali Linux Alternatives: How to Get Started with BlackArch, a More Up-to-Date Pentesting Distro « Null Byte :: WonderHowTo

Pwn_Phones

Mobile Hacking Part 1: Introduction and Device Building
Mobile Hacking
Android-based Pwn Phone is prepared to do evil for your network’s own good | Ars Technica
Learn How to Do Android Hacking and Penetration Testing From Scratch
15 Best Free Hacking Apps For Android Phones (2017 Edition)
Droidsniff - Stealing user's social credentials - Coding Security
how does tpacketcapture work - Google Search
HACK COMPUTER USING INTERCEPTER-NG (android) - Coding Security
Tutorial-How to use zANTI2 for hacking - Coding Security
12 Best WiFi Hacking Apps For Android Smartphones | 2017 Edition
7 Best Android Hacking Apps on the Internet Ever in 2017
Hijacker v1.4 - All-in-One Wi-Fi Cracking Tools for Android - KitPloit - PenTest Tools for your Security Arsenal ☣

Exploring Kali Linux Alternatives: How to Get Started with Parrot Security OS, a Modern Pentesting Distro « Null Byte :: WonderHowTo
Kali Linux on AWS
Hack Like a Pro: Getting Started with Kali, Your New Hacking System « Null Byte :: WonderHowTo
Mac for Hackers: How to Get Your Mac Ready for Hacking « Null Byte :: WonderHowTo
BlackArch Linux Distro For Ethical Hacking Drops 32-bit Support
Turn Any Phone into a Hacking Super Weapon with The Sonic « Null Byte :: WonderHowTo
40+ Free Best Tools that will help your become a powerful hacker - Coding Security

Vulnerable_Pen-testable_Targets

OWASP Vulnerable Web Applications Directory Project - OWASP
www.amanhardikar.com/mindmaps/PracticeUrls.html
Practice.png (3780×4199)
Vulnerable By Design ~ VulnHub
How to Use SecGen to Generate a Random Vulnerable Machine - Vagrant, Nmap « Null Byte :: WonderHowTo
GitHub - rapid7/hackazon: A modern vulnerable web app
Hackazon
Hack This Site!
GitHub - ethicalhack3r/DVWA: Damn Vulnerable Web Application (DVWA)
Create your ethical hacking environment: install DVWA into your Kali Linux
GitHub - WebGoat/WebGoat: WebGoat 8.0
Test Site
GitHub - bkimminich/juice-shop: OWASP Juice Shop is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws.
DVIA (Damn Vulnerable iOS App) - A vulnerable iOS app for pentesting
DVAR - Damn Vulnerable ARM Router | The Exploit Laboratory
Exploit Development: How to Learn Binary Exploitation with Protostar « Null Byte :: WonderHowTo
OWASP iGoat (Swift) - A Damn Vulnerable Swift Application For iOS - KitPloit - PenTest Tools for your Security Arsenal ☣
PwnAdventure3 - Game Open-World MMORPG Intentionally Vulnerable To Hacks - KitPloit - PenTest Tools for your Security Arsenal ☣
OWASP Juice Shop - An Intentionally Insecure Webapp For Security Trainings Written Entirely In Javascript - KitPloit - PenTest Tools for your Security Arsenal ☣
Noobz Guide for Setting Up a Vulnerable Lab for Pentesting
Kurukshetra - A Framework For Teaching Secure Coding By Means Of Interactive Problem Solving - KitPloit - PenTest Tools for your Security Arsenal - vulnerable pentestable targets

Cloud_Hosted_Labs

Virtual Penetration Testing Labs - Offensive Security
Hack The Box :: Penetration Testing Labs
How to setup and run a penetration testing (pentest) lab on AWS or Google Cloud with Kali Linux, Metasploitable and WebGoat | Ravello Blog
How to setup and run a pentest lab on AWS – ls /blog
Penetration Testing - Amazon Web Services (AWS)
Penetration Testing in the AWS Cloud: What You Need to Know - Rhino Security Labs

Creating a Simple Free Malware Analysis Environment | MalwareTech
Hack Like a Pro: How to Create a Virtual Hacking Lab « Null Byte :: WonderHowTo
how to make use of old pc within hacking lab - Google Search
Set up your own malware analysis lab with VirtualBox, INetSim and Burp - Christophe Tafani-Dereeper
Metta - An Information Security Preparedness Tool To Do Adversarial Simulation - KitPloit - PenTest Tools for your Security Arsenal ☣
RedHunt OS - Virtual Machine For Adversary Emulation And Threat Hunting - KitPloit - PenTest Tools for your Security Arsenal ☣
SEED Project - Hacking Labs
Run SEED VM on VirtualBox - SEEDVM_VirtualBoxManual - Definitive Guide on Configuring Hacking Lab on VirtualBox - VM Networking, VM Clone/Cloning, VM Folder Sharing Configuration - host only vs nat network

Forbidden_Targets

403 Forbidden - Targets to Hack

Privacy_and_Anonymity

Privacy

Cyber_Threat_Modelling

What Is Threat Modeling? - Motherboard
Threat model | Surveillance Self-Defense
Security training: Targeted Activists versus The State · AnarchoTechNYC/meta Wiki · GitHub

State_Surveillance

Surveillance Kills Freedom By Killing Experimentation | WIRED
Swedish court tells ISP to block The Pirate Bay in the country
Edward Snowden on Protecting Activists Against Surveillance | WIRED
Why Big Tech and the Government Need to Work Together | WIRED
Tech industry told ‘privacy is not absolute’ and end-to-end encryption ‘should be rare’ | 9to5Google
DOJ: Strong encryption that we don’t have access to is “unreasonable” – Ars Technica
The Motherboard Guide to Avoiding State Surveillance - Motherboard
Australia announces plan to ban working cryptography at home and in the US, UK, New Zealand, and Canada / Boing Boing
Congress Just Voted to Let Internet Providers Sell Your Web History
How the Government Hides Secret Surveillance Programs | WIRED
Surveillance system or public-safety tool? Seattle dismantles controversial wireless mesh network | The Seattle Times
The Apple-FBI Fight Isn't About Privacy vs. Security. Don't Be Misled | WIRED
Does the NSA have a backdoor to Linux? - Quora
‘Significant’ FBI Error Reignites Data Encryption Debate | WIRED
FBI admits over-counting locked iPhones and other mobiles - BBC News
2 years after FBI vs. Apple, encryption debate remains - Axios
How the US Government Planted 'Spy Phones' on Suspects | WIRED
Reflections on Trusting Trust - open source code liability to backdoor planting - is linux backdoored -security
Prevention measures against laptop seizure at US borders - data privacy at borders
EFF's Guide to Protecting Electronic Devices and Data at the U.S. Border | privacy
apt - What are prudent security precautions to take for business travel by people with access to sensitive info? privacy at borders

Overall_Privacy_Encryption_Measures

5 Privacy Mistakes that Leave You Vulnerable Online - definitive - Cyber Crime, DDOS, Malware, Privacy, security, Technology, VPN
Social Hacking and Protecting Yourself from Prying Eyes « Invisible Computer :: WonderHowTo
You need to encrypt all your data. This is how it’s done
This is how you encrypt your entire life | TechTalks
Encrypt Everything - Ultimate Encryption Guide - Be Encrypted
How to Encrypt All of the Things, From Chats to Calls and More | WIRED
Real people don't (just) need encryption / Boing Boing
Physical Measures to Amp Up Your Digital Security - wired
The Encryption Debate Should End Right Now, After Vault 7, Shadow Brokers, WannaCry, and Petya | WIRED
How to Protect Your Personal Data in 3 Simple Ways
To Protect Genetic Privacy, Encrypt Your DNA | WIRED
What To Do If You've Been Doxed | WIRED
A radical proposal to keep your personal data safe | Richard Stallman | Opinion | The Guardian
Encryption Becoming 'Public Safety Issue' - FBI | News | Cointelegraph
Why Care About Privacy?
9 Tips For Internet Privacy [Infographic] - Defintive Visual Guide - privacy respectuous alternatives

Industrial_Privacy_Violations_Tracking

next gen captcha privacy at DuckDuckGo
Apple Removes Several Trend Micro Apps For Collecting MacOS Users' Data
Google Secretly Tracks What You Buy Offline Using Mastercard Data
Google and MasterCard will track your retail spending under a secret deal

GDPR

GDPR 'risks making it harder to catch hackers' - BBC News
Why hackers will use GDPR to their advantage by TSG - Hakin9 - IT Security Magazine
Will Europe's Looming Tech Rules Prove to Be a Template for the World?
GDPR and the REAL impact on business
Ransomhack; a new attack blackmailing business owners using GDPR
13 things to know about the GDPR, Mozilla and Firefox
GDPR quiz: How will data privacy law affect you? - BBC News
Does the GDPR Threaten the Development of Blockchain?

What Amazon Echo and Google Home Do With Your Voice Data—And How to Delete It | WIRED
Ethics refactoring · AnarchoTechNYC/meta Wiki
Android phones 'betray' user location to Google - BBC News
More than 480 web firms record 'every keystroke' - BBC News
Skype faces fine after refusing to allow eavesdropping – Naked Security
Germany bans children's smartwatches - BBC News
As DOJ calls for “responsible encryption,” expert asks “responsible to whom?” – Ars Technica
How Facebook's tentacles reach further than you think - BBC News
how to make sure a conversation is not listened on mobile - Google Search
Google Home Mini secret-recording fiasco is a black eye for Google at the worst possible time - Business Insider
Uber removing private iOS API that allowed them to record your display | 9to5Mac
AccuWeather app shared users' location data - BBC News
Alexa, Are You Spying On Me? Not Really, Maybe, It's Complex!
Massive Breach Exposes Keyboard App that Collects Personal Data On Its 31 Million Users
Is Your DJI Drone a Chinese Spy? Leaked DHS Memo Suggests
HP Silently Installs Telemetry Bloatware On Your PC—Here's How to Remove It
Facebook’s ex-president: we exploited “vulnerability in human psychology” – Naked Security
Google faces mass legal action in UK over data snooping - BBC News
Massive Breach Exposes Keyboard App that Collects Personal Data On Its 31 Million Users
This Fidget spinner app is sending other apps data to Chinese server
How To Check And Remove HP Keylogger From Your Laptop?
Leftover Debugger Doubles as a Keylogger on Hundreds of HP Laptop Models | Threatpost | The first stop for security news
HP laptops found to have hidden keylogger - BBC News
GPS is off so you can’t be tracked, right? Wrong – Naked Security
hackread.com/android-gaming-apps-tracking-tv-viewing-habits/
Facebook Accepts That Sometimes It Can Be A Threat To Democracy
How to Detect and Disable Email Tracking
Facebook wants you to install a VPN app accused of spying on users
ISPs Caught Injecting Cryptocurrency Miners and Spyware In Some Countries
All You Need to Know About the Cambridge Analytica Privacy Scandal
Amazon explique pourquoi son enceinte connectée Echo a enregistré une conversation, puis l'a envoyée à un contact
Facebook Accused of Giving Over 60 Device-Makers Deep Access to User Data
Google Collects Android Location Data Even When Location Service Is Disabled
Are Your Smartphones' Batteries Spying on You?
Amazon Alexa Has Got Some Serious Skills—Spying On Users!
Apple jams Facebook's web-tracking tools - BBC News
ethics - How to be diplomatic in refusing to write code that breaches the privacy of our users - The Workplace Stack Exchange

Hardware-Infrastructure_Privacy

GitHub - thearkadia/The_Ark: The Ark - ¿Democracy's Favorite Device?

Private_Celluar_Coms

Sopranica: Text And Call Using This Open Source Cellular Network For Complete Anonymity
Now use Internet anonymously through Tor-enabled SIM card Onion3G
ZeroPhone Is "Coming Soon": A Raspberry Pi-Based, Linux-Powered Phone For Just $50
This Interview Was Conducted on an Anonymous, DIY Cell Phone Network - Motherboard
This Software Developer Is Making a Surveillance-Free Cell Phone Network - Motherboard
does microwave block cell phone at DuckDuckGo
putting cell phone in microwave for privacy at DuckDuckGo
Can Android phone running without SIM card be tracked (localized) by police? IMEI, GSM, Access Point - Phone/Cellular tracking
How To Find IMEI Number Of Your Phone (Even If It's Lost) - Phone/Cellular Tracking

Editor’s Corner—Private wireless networks are quietly becoming a thing | FierceWireless

Secure_EndPoints-Stored_Data-Storage_Devices

Security_Privacy-focused_Operating_Systems

Tails_OS

how secure is tails os - Google Search
The security flaws in Tails Linux are not its only problem | Computerworld
The ultra-secure Tails OS beloved by Edward Snowden gets a major upgrade | PCWorld
https://lifehacker.com/5916551/browse-like-bond-use-any-computer-without-leaving-a-trace-with-tails
Linux Security Distros Compared: Tails vs. Kali vs. Qubes

Qubes_OS

Qubes OS | My Experience So Far

Hardened_Linux_From_Scratch

Hardened Linux From Scratch - privacy respectuous operating system alternative
Download HLFS
Has anyone built a hardened, musl-based LFS system? Are there any good resources? [X-post /r/linuxfromscratch] : linuxquestions

Mobile_Privacy

Mobile Websites Can Tap Into Your Phone's Sensors Without Asking | WIRED
how secure keyboard apps are in Android at DuckDuckGo
Powerful Android and iOS Spyware Found Deployed in 45 Countries
keyboard mobile apps comparison at DuckDuckGo
Location History allows Google (GOOG) to track every move you make with an Android phone — Quartz
Android’s full-disk encryption just got much weaker—here’s why | Ars Technica
Why all Android phones (even Samsung's) should run stock Android | PCWorld
Hackers Used Malicious MDM Solution to Spy On 'Highly Targeted' iPhone Users
does huawei spy on its smartphone users at DuckDuckGo
android rooting and privacy at DuckDuckGo
Mobile Phones privacy
How to Encrypt your Phone? (Guide to Encrypted Phone) | Beencrypted
Liberate Your Device - Free Your Android! privacy respectuous Android Distribution - F-Droid - LineageOS/CyanogenMod - FSFE
LineageOS – LineageOS privacy respectuous Android Distribution
microG Project - privacy respectuous Google's Android user space apps and libraries
How can you use Android, but not be tracked by Google - privacy respectuous alternatives/measures - F-Droid, Firefox, Tor, VPN - LineageOS based on the old CyanogenOS -
Improve your Android device privacy level with our easy to follow guide - Device Encryption, lockscreen, find my device feature, password strength, VPN, encrypted
Mission Impossible: Hardening Android for Security and Privacy - definitive smartphone/mobile security, privacy - hardware, carrier baseband firmware | Tor Blog
2016 update - Mission Impossible: Hardening Android for Security and Privacy - definitive smartphone/mobile security, privacy - hardware, carrier baseband firmware | Tor Blog
How to encrypt your iPhone, Android phone, or Windows Phone - FDE Full Disk Encryption

Disk_Encryption

Filesystem_Encryption

How to encrypt and decrypt a folder on Android with SSE Universal Encryption | FNR Solutions, Inc. | LinkedIn
encryption - How secure is an encrypted LUKS filesystem? - Ask Ubuntu
luksipc Documentation — luksipc 0.04 documentation
Filesystem-level encryption - Wikipedia
List of cryptographic file systems - filesystems with support for filesystem-level encryption - Wikipedia

How To Encrypt Your Hard Drive - Best Guide - Be Encrypted

Full_Disk_Encryption

Hardware_Encryption

Microsoft issues a security advisory regarding a vulnerability in hardware encryption - MSPoweruser

FDE_on_Android

android 7 full disk encryption at DuckDuckGo
Millions of Android devices have flawed full disk encryption
How to Crack Android Full Disk Encryption on Qualcomm Devices
Bits, Please!: Extracting Qualcomm's KeyMaster Keys - Breaking Android Full Disk Encryption
Google Android on Qualcomm Full Disk Encryption weak encryption
Android Flaw Allows Full-Disk Crypto Bypass - BankInfoSecurity
android full disk encryption site:security.stackexchange.com - Google Search
Are there actually any advantages to Android full-disk encryption? - Information Security Stack Exchange
Full-Disk Encryption  |  Android Open Source Project
Do android phones have hardware chips for encryption? If it's software only, then what is the performance/battery impact? - Android Enthusiasts Stack Exchange
How can Android encryption be so fast? Definitive explanation of FDE encryption/decryption process- Information Security Stack Exchange
How have ARM TrustZone flaws affected Android encryption? Android's FDE implementation - vs Apple iPhones, firmware

Full-Disk Encryption FDE Works - Schneier on Security
New Cold Boot Attack Unlocks Disk Encryption On Nearly All Modern PCs
F-Secure Press Room | Global
full disk encryption huawei honor 8 - Google Search
A Decade-Old Attack Can Break the Encryption of Most PCs | WIRED
Security flaw in ‘nearly all’ modern PCs and Macs exposes encrypted data – TechCrunch
full disk encryprion huwaei honor 8 at DuckDuckGo
Tales from the Crypt: Hardware vs Software - Infosecurity Magazine
https://online.tugraz.at/tug_online/voe_main2.getvolltext?pCurrPk=59565
Trusted Platform Module (TPM) Summary | Trusted Computing Group
Hardware vs Software-Based Encryption | Kingston
TPM and HSM Hardware Encryption Devices | Get Certified Get Ahead
Is it better to use Bitlocker or the built-in-drive-encryption that my SSD offers? - Super User
How to Use the TPM: A Guide to Hardware-Based Endpoint Security | Trusted Computing Group
What are the differences between TPM and HSM? - Information Security Stack Exchange
Bitlocker: hardware or software encryption without a TPM? - Super User
Types of attacks for volume encryption keys (Windows 10) | Microsoft Docs
TPM vs. EFS
Does Windows protect MBR from being overwritten? - Information Security Stack Exchange
https://www.trustedcomputinggroup.org/wp-content/uploads/SANS-Implementing-Hardware-Roots-of-Trust.pdf
http://www.cs.tau.ac.il/~tromer/istvr1516-files/lecture10-trusted-platform-sgx.pdf
Bootkit bypasses hard disk encryption - The H Security: News and Features
http://courses.cs.vt.edu/~cs5204/fall10-kafura-BB/Papers/TPM/Intro-TPM-slides.pdf
What is Full-Disk Encryption (FDE)? | TechTalks
How to Encrypt Your Home Folder After Installing Ubuntu
How to get quality-encryption on Debian disk after installation? - Unix & Linux Stack Exchange
Look before you leap into Disk Encryption
Comparison of disk encryption software - Wikipedia
Reminder: macOS still leaks secrets stored on encrypted drives | Ars Technica
Full Disk encryption FDE - vs. filesystem-level encryption - TPMs introduces single point of failure in the encryption - Wikipedia
security - How does FDE (Full Disk Encryption) work so quickly? - definitive - performance - SSD vs HDD
What is full-disk encryption (FDE)? - Definition from WhatIs.com
full disk encryption android - Google Search
full disk encryption ios - Google Search
how hard disk encryption works - Google Search
how to encrypt hard drive kali linux - Google Search
Uncrackable: Secure Your Secrets with 4096-Bit Encryption « Null Byte :: WonderHowTo
Bruteforcing Linux Full Disk Encryption (LUKS) with hashcat - The Forensic way!
system installation - What are the advantages/disadvantages of the new encryption feature in ubuntu 13.10 - Ask Ubuntu
Cold boot attack - side channel, memory disclosure attack - secure boot UEFI, memory dump - secure data erasure/deletion - Full Memory Encryption RAM - Full Disk Encryption
Attackers Can Use Sonic and Ultrasonic Signals to Crash Hard Drives
Linux Unified Key Setup - Wikipedia
Emergency self-destruction of LUKS in Kali | Kali Linux
Locking Down Data - Full Disk Encryption vs. File Encryption - Data Security Blog | Thales e-Security
Full disk encryption | Surveillance Self-Defense
How to: Encrypt Your iPhone | Surveillance Self-Defense
How to: Encrypt Your Windows Device | Surveillance Self-Defense
Linux File Encryption Using GPG - Gnu Privacy Guide - PGP
Comparison of encrypted external drives - Hardware-based FDE Full Disk Encryption - Wikipedia
Data remanence - secure deletion - Wikipedia
Hard Drive Passwords Easily Defeated; the Truth about Data Protection - definitive comparison - EFI/BIOS Password vs OS Operating System Password vs HDD Hard Drive ATA Password vs Software-Based FDE Full Disk Encryption vs Next-Generation Hardware-based Encryption
How secure is hardware Full disk encryption (FDE) for SSD's - definitive explanation for the weaknesses of SED/Hardware based FED -
Self-encrypting drive / hardware based FDE VS full disk encryption VS volume/filesystem level encryption
Self-Encrypting Disks pose Self-Decrypting Risks - definitive paper on How to break Hardware-based Full Disk Encryption - attacks, cold boot attack, evil maid attacks
Hardware full disk encryption technology for military applications using two-layer commercial solutions - SSD, HDD - Military Embedded Systems
Think your SSD offers rock-solid hardware-based full disk encryption? Here’s why it’s time to think again… SED, Bitlocker, Veracrypt
I want the TRUTH about SSDs and FDE (Full Disk Encryption) / SED (Self-Encrypting Drive - ATA/PATA Password - Ars Technica OpenForum
DEFINITIVE - Self-Encrypting Drives - Hardware based FDE for HDD and SSD - definitive technical breakdown - Firmware compromise, Key management NVRAM in-memory key attack, constant power attack, pre-boot authentication - TCG OPAL 2.0 - secure disk erasure/ sanitization - disadvantages vs software full based encryption FDE, LUKS dm-crypt - Constant-power exploits, Key-in-memory exploits, Compromised firmware - sedutil, Drive Trust Alliance (DTA)
Full Disk Encryption vs Storage/ filesystem Encryption - Information Security Stack Exchange
Hardware based FDE vs Bitlocker - Information Security Stack Exchange
Is suspend-to-ram really a meaningful risk for Full Disk Encryption? key management - Information Security Stack Exchange
Hardware based full encryption for flash drives - Information Security Stack Exchange
How to tell if my laptop is protected by FDE? - Super User
Are Macs vulnerable to the recent SSD SED/hardware based encryption vulnerability? - Ask Different
How does full memory encryption in newer processes protect against DMA attacks? definitive answer - cold boot attack - TME/SME, TPM - Information Security Stack Exchange
Is it possible to prevent a physical attack on full disk encryption FDE? - Information Security Stack Exchange
SSD full disk encryption vs Veracrypt - vulnerabilties, weaknesses, SSD-awareness FDE - truecrypt - copy from RAM
DEFINITIVE - Is it possible to tell if hard drive is encrypted? definitive recognition/detection/identification techhniques - digital forensics, signatures - file based ecnryption vs FDE - file randomness , /dev/urandom, probability distribution, randomness- bitlocker, diskcryptor/truecrypt/veracrypt, filevault, cryptsetup/LUKS, checkpoint full disk encryption FDE, GuardianEdge Encryption Plus/Anywhere/Hard Disk Encryption and Symantec Endpoint Encryption, McAfee Safeboot/Endpoint Encryption, Sophos Safeguard Enterprise and Safeguard Easy, Symantec PGP Whole disk Encryption
Breaking full-disk encryption on a computer that's rarely used - Information Security Stack Exchange
How secure is Intel SSD Encryption? ATA passwords, full disk encryption- Information Security Stack Exchange
Are there any hardware-based full disk encryption FDE solutions for my notebook? truecrypt, Intel chip for AES - Information Security Stack Exchange
Laptops SSD: Hardware based FDE plus FDE DM-Crypt/Luks - double layer FDE - Security and Performance - Information Security Stack Exchange
How do I verify that my FDE/SED Opal SSD is indeed encrypted - SED Hardware based FDE encryption verification/confirmation
Erasing a hard-disk, encrypting it as alternative? data erasure, cryptoshredding - Information Security Stack Exchange
If /system partition is never encrypted (even in "full-disk" encryption), how is it protected? weakness - Android Enthusiasts Stack Exchange
Isn't file encryption good enough? Volume/Storage/Filesystem-level encryption VS FDE Full disk encryption - Information Security Stack Exchange
Full Disk Encryption vs File-Based/filesystem-level Encryption - The Security Buddy
Which type of disk encryption protects the MBR (master boot record) file of the system? full disk encryption - Skillset
Full Disk Encryption with VeraCrypt – Andrew Douma – Medium
Mitigating the LUKS decryption key residing in RAM for FDE - Information Security Stack Exchange
When using LUKS, which parts of the hard disk are not encrypted? dm-crypt - Information Security Stack Exchange
Securing the bootloader - UEFI Secure boot - Information Security Stack Exchange
Multi-boot with full hard drive encryption FDE and pre-boot authentication - Information Security Stack Exchange
Boot Sequence -MBR - Power-On Self-Test POST - OSDev Wiki
Crypto-shredding & backups of keys - Information Security Stack Exchange
Crypto shredding: How it can solve modern data retention challenges - data erasure/deletion - GDPR
Cryptographic Erasure/ Crypto-shredding Moving Beyond Hard Drive ...
Cryptography and Computer Security: The life cycle of Passwords & Keys Life cycle and their relationship with your protection - crypto-shredding, secure data erasure/deletion - key/password management/secure storage
UT Arlington Computing Device Full Disk Encryption FDE Requirements - compliance example
Full Disk Encryption Buyer's Definitive Guide - vs file-based/filesystem encryption - key management and recovery - security shortfalls/risks/weaknesses - Bitlocker, AES-NI - In-memory Attacks
Key Management and Full Disk Encryption (FDE) - Pre-boot authentication - central storage and distribution of key - Bitlocker
Full Disk Encryption - TPM, Bitlocker, Filevault
Researchers Break Full-Disk Encryption of Popular SSDs | SecurityWeek.Com
How the Drive Security feature works - Hardware based FDE/SED - FIPS recommendations
Full Disk Encryption - an overview - Payment Card Industry - Bootkit/Rootkit - MBR - Cold/Stoned Boot Attack - DMA -RAM Dump - FDE Weaknesses - Forensics on FDE -
You & Your Data, Part 1: Full Disk Encryption – Bitlocker, Filevault, Veracrypt - Dock – Medium
Full Disk Encryption with Multi-Factor Authentication - pre-boot authentication environment- yubikey
Self-encrypting deception: weaknesses in theencryption of solid state drives SSD - definitive white paper -
SSD SED vulnerabilities - Opal specs flawed implementation - Bitlocker
FDE, Full disk encryption - ManualFullSystemEncryption - LUKS - LVM - secure/encrypted Boot - manual partitioning and optionally any of these features: dual-booting (e.g. with Windows) - encrypted hibernation - hybrid suspend - multi-disk installation - Community Help Wiki
Encrypting Your Laptop Like You Mean It - definitive real life scenario around Full Disk Encryption - Cold boot attack demonstration
How do I buy a laptop with an encrypted hard drive? | Technology | The Guardian
system installation - How can I install Ubuntu encrypted with LUKS with dual-boot? Full Disk Encryption FDE - definitive guide on dual-boot FDE - - Ask Ubuntu
Full Disk Encryption VS Home Folder/Filsystem encryption - why should the former be chosen over the latter
Is hardware based full disk encryption more secure that software based? FDEs - definitive comparison - Information Security Stack Exchange
encryption - Encrypted flash drives - SEDs - fde
Advice on buying an encrypted disk - Choosing SED self encrypted drive
What does hardware full disk encryption imply? - LUKS
Hardware-based full disk encryption FDE - Self-Encrypting Drive SED - cryptoshredding - Wikipedia
Disk encryption software - Full Disk Encryption FDE - Cryptoshredding - plausible deniability
Got HW Crypto ? On the (in)security of a Self-Encrypting Drive series - SED hardware based full disk encryption FDE vulnerabilities
256-bit AES encryption broken in SandForce SSD controllers - government surveillance - backdoors - SEDs hardware based FDE
Breaking Full Disk Encryption FDE from a Memory Dump - Appsecco
Breaking Hard-Disk Encryption - FDE - ElcomSoft Forensic Disk Decryptor can decrypt BitLocker, PGP, and TrueCrypt - definitive Clive Robinson's insights on FDE/hardware based FDE , TPM, DMA Direct Memory Access, MMU, PKI
filesystem encryption vs full disk encryption at DuckDuckGo

VM_Encryption

How to encrypt VirtualBox VMs - TechRepublic
Enabling Virtual Machine Encryption (VM Encrypt) | OVH Guides
virtual machine - Is there any reason to encrypt a VM? (already have file vault encryption for Mac enabled) - Stack Overflow
Virtual Machine Encryption Best Practices
VMware Workstation Documentation Center
virtualization - Full Disk Encryption within a VM, how secure is it? - Information Security Stack Exchange
encryption - Are there any benefits if you encrypt the home folder in a VM? - Information Security Stack Exchange
encryption - Completely encrypting virtual machine (for free) - Information Security Stack Exchange

veracrypt at DuckDuckGo

Disk_Data_Destruction

How to Safely and Securely Dispose of Your Old Gadgets | WIRED
How to Permanently Delete Files to Protect Privacy and Passwords - secure deletion « Null Byte :: WonderHowTo
Answer - Quora
how to make a storage disk completely unreadable - Google Search
does putting drive in microwave effectively destroy all data at DuckDuckGo
privacy tips before giving away a mac os x at DuckDuckGo
How to Delete files securely in Mac OS X Leopard « Operating Systems :: WonderHowTo
What Should I Do to My Work Laptop Before I secure deletion - Leave My Job?
How to: Delete Your Data Securely on Mac OS X | Surveillance Self-Defense
How to: Delete Your Data Securely on Windows | Surveillance Self-Defense
Can Intelligence Agencies Read Overwritten Data? Secure data deletion
Secure deletion: a single overwrite will do it - The H: Open Source, Security and Development
Securely deleting files from ext4 filesystems [LWN.net] - secure deletion
security - How to securely delete data after rm - secure deletion - Unix & Linux Stack Exchange
How to Clean a Computer Before Leaving a Job | secure deletion - Techwalla.com
privacy - I'm leaving my job and want to erase as many personal details etc. as possible; any tips? secure deletion in workplace, privacy - Information Security Stack Exchange

End-to-end encryption isn't enough security for 'real people'
World Cup 2018: How to Secure Your Devices When Traveling in Russia | WIRED
Wear leveling | Surveillance Self-Defense
Keeping Your Data Safe | Surveillance Self-Defense

Secure_End_to_End_Communications

Browsing_Tools_Privacy

Paid Attention

Browser_Privacy

Browsers_Comparison_Over_Privacy

chromium vs firefox privacy - Google Search
Firefox installs add-ons into your browser without consent… again
chromium vs firefox quantum privacy - Google Search
A Lighter-weight Firefox
Best Secure Browsers that Protect Your Privacy - definitive breakdown - Firefox privacy concerns - Ungoogled chromium - browser compartmentalization - Secure browser add-ons list | Restore Privacy
Tor vs. PirateBrowser vs. Anonymox: Privacy and Access Compared

Privacy_Enhancing_Extensions

The Firefox NoScript guide you have all been waiting for - gHacks Tech News
The Best Browser Extensions that Protect Your Privacy
https everywhere worth it - Google Search
tls - Is using "HTTPS everywhere" extension secure? - Information Security Stack Exchange
HTTPS Everywhere - Wikipedia
HTTPS everywhere sucks! « Dvorak News Blog
engadget.com/2018/02/24/mit-veil-private-browsing/
5 things to note about HTTPS Everywhere | ZDNet
Firefox Monitor tool informs users if they have been hacked
Firefox will soon flag sites that have been hacked
5 Firefox extensions to protect your privacy | Opensource.com

Fingerprinting

canvas based browser fingerprinting - Google Search
A gargantuan all-seeing eye is watching you on popular websites – Naked Security
What is Device Fingerprinting?
fingerprint - Why do browsers send such detailed user agent strings? - Information Security Stack Exchange
using chrome behind a vpn is there fingerprinting risk at DuckDuckGo
BrowserLeaks.com - Assessment Tool - Web Browser Security Checklist for Identity Theft Protection - IP, Geolocation API, Flash Player, WebGL, Canvas Fingerprinting, JavaScript, Silverlight, java Applet, Content Filters, Features Detection
Device Info - security test - Fingerprint Assessment Tool, Technology Detection
Browser Security Audit - Assessment Tool - Check for Same-origin Policy, Content Security Policy, Corss-Origin Resource Sharing, Cookies, Request Headers, Response Headers
Screen Information - Browser fingerprinting assessment tool - BrowserSpy.dk
privacy - How can you be tracked using screen resolution/monitor size in Tor? - Information Security Stack Exchange
Browser Fingerprinting: Explanation & Solutions (2019) - definitive guide | Restore Privacy

AdBlocking_Technologies

Adblocker-blockers get around sites that block adblockers
How WIRED Is Going to Handle Ad Blocking | WIRED
GitHub - reek/anti-adblock-killer: Anti-Adblock Killer helps you keep your Ad-Blocker active, when you visit a website and it asks you to disable.
hBlock - Improve Your Security And Privacy By Blocking Ads, Tracking And Malware Domains - KitPloit - PenTest Tools for your Security Arsenal ☣

Ultra_Sonic_Tracking

How to Block the Ultrasonic Signals You Didn't Know Were Tracking You | WIRED
Ultrasonic Signals Are the Wild West of Wireless Tech | WIRED

4 Reasons To Ditch Your Browser and Use Brave (and yes, one of them is Bitcoin)
Syncthing | A Few Quick Thoughts
Firefox Privacy - The Complete How-To Guide | Restore Privacy
How to force Firefox to forget your browser history - TechRepublic
"This add-on can access your data for all websites" - A security/privacy issue? (Firefox) - privacytoolsIO
GitHub - urbanadventurer/Stop-tracking-me-on-reddit: Reddit is tracking every out-going link you click. Even if you are not logged in, every news article, image, or website you visit from Reddit is being recorded. Use this extension to block the tracking.
can mozilla hand over your data to government at DuckDuckGo
is having a firefox account a threat to privacy at DuckDuckGo
Cross-site tracking: Let’s unpack that | The Firefox Frontier
Browser detection using the user agent - HTTP | MDN
How to Trick Websites into Thinking You're on a Different OS or Browser « Invisible Computer - fingerprint :: WonderHowTo
How to disable Firefox's session restore crash recovery feature | How To Wiki | Browser privacy

Search_Engines_Comparison_Over_Privacy

Private_Search_Engines

DuckDuckGo — Privacy, simplified. - Private Search Engine
DuckDuckGo - Wikipedia

Startpage-Former_Ixquick

Startpage.com - The world's most private search engine
Startpage.com - Wikipedia
Why does Google let Startpage access their search results? - Startpage.com Support
Why do I get different results with Startpage.com than Google? - Startpage.com Support
How Startpage.com keeps you out of the "Filter Bubble" - Startpage.com Support
[Let's Think again] Startpage and DuckDuckGo are lying or not · Issue #168 · prism-break/prism-break - doubts · GitHub
The Anonymous View Proxy—technical details - vs VPN - Startpage.com Support
“Anonymous View” with the Startpage.com Proxy - vs VPN - browser fingerprinting
Startpage.com Anonymous View allows you to surf the web anonymously - update : privacytoolsIO
How does HTTPS encryption protect me? Does it keep my ISP from seeing me? - Startpage.com Support

Qwant - The search engine that respects your privacy -- Private Search Engine
Qwant - Wikipedia
searx.me - Private Search Engine
Searx - Wikipedia
GitHub - asciimoo/searx: Privacy-respecting metasearch engine
Disconnect Search: Search privately using your favorite search engine - Default search engine in Tor Browser
Disconnect Mobile - Wikipedia
Search Encrypt - The Privacy Based Search Engine - private
Search Encrypt - Wikipedia
search.privacytools.io - private search engine
Searx - How to Create Your Own Search Engine for More Privacy & Zero Trust Issues - DuckDuckGo, Startpage - definitive guide on building own search engine « Null Byte :: WonderHowTo

Comparison of web search engines - Wikipedia
Search engine privacy - Wikipedia
does using Google bang in duckduckgo keep Privacy - Google Search
10 Private Search Engines That Do Not Track You
risk about sharing portable wifi hotspot at DuckDuckGo
If I use !g in DuckDuckGo google keeps tracking me? : duckduckgo
How anonymous is DuckDuckGo? - Quora
startpage vs duckduckgo at DuckDuckGo
I Stopped Using Google As My Search Engine, Here’s Why…
The Best Private Search Engines — Alternatives to Google
DuckDuckGo or Startpage? - SecuritySpread
Private Search Engines: The Ultimate Guide (2019) - definitive comparison - metasearch vs search engine

How ODNS keeps your browsing habits secret – Naked Security

Secure_Messaging_Apps

Secure Messaging Apps Comparison | Privacy Matters

Telegram

Malware infected fake Telegram Messenger app found in Play Store
Zero-day vulnerability in Telegram - Securelist
Hackers Exploit 'Telegram Messenger' Zero-Day Flaw to Spread Malware
Critical Telegram flaw under attack disguised malware as benign images | Ars Technica

Skype

Skype can't fix a nasty security bug without a massive code rewrite | ZDNet

Why you need a better handle on the WhatsApp, Signal and Telegram apps - CNET

Signal_app

Signal's "Sealed Sender" Is a Clever New Way to Shield Your Identity | WIRED
Signal App's New Privacy Feature Conceals Sender ID from Metadata
Signal Desktop Leaves Message Decryption Key in Plain Sight
Signal (software) - Wikipedia
Why We Should All Be Using the Encrypted Chat App Signal
Signal Releases New Standalone Desktop Client - Deep Dot Web
Signal app’s address book security could upset governments – Naked Security
How to Use Signal - Motherboard
Signal Encrypted Messenger on GNU/Linux - gHacks Tech News
Hackers Reveal How Code Injection Attack Works in Signal Messaging App
Another severe flaw in Signal desktop app lets hackers steal your chats in plaintext
Serious XSS vulnerability discovered in Signal – Naked Security
Self-destructing messages received on 'Signal for Mac' can be recovered later
How do I verify the person I'm chatting with is who they say they are? – Support
Amazon pushes Signal creators to change their anti-censorship tool
17-year-old finds screen lock bypass vulnerability in Signal app for iOS
Signal Protocol - Wikipedia

Wickr

Secure Chat App Wickr Thinks It’s Solved the Encrypted Conference Calls Problem

Whatsapp

WhatsApp : un bogue de corruption mémoire qui pouvait être déclenché grâce à un simple appel vidéo, a été corrigé sur iOS et Android
WhatsApp Encryption Security Flaws Could Allow Snoops to Slide Into Group Chats | WIRED
Just Answering A Video Call Could Compromise Your WhatsApp Account
thehackernews.com/2018/01/whatsapp-encryption-spying.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+TheHackersNews+(The+Hackers+News+-+Security+Blog)&m=1
How to protect yourself against WhatsApp’s non-present backdoor | TechTalks
How WhatsApp encryption works – and why there shouldn't be a backdoor
WhatsApp is secure and OK for politicians to use, provided simple steps are followed
mitm attack whatsapp encrypted message at DuckDuckGo
ssl pinning whatsapp encryption at DuckDuckGo
whatsapp encryption vs tls at DuckDuckGo
Signal >> Blog >> WhatsApp's Signal Protocol integration is now complete
'Backdoor' in WhatsApp's end-to-end encryption leaves messages open to interception [Updated]
Signal >> Blog >> Open Whisper Systems partners with WhatsApp to provide end-to-end encryption
encryption - To what extent is WhatsApp's statement on secure messaging realistic? - Cryptography Stack Exchange
encryption - Which Cryptography algorithm is used in WhatsApp end-to-end security? - Information Security Stack Exchange
Encrypted messaging platform WhatsApp denies backdoor claim |

Ricochet

Ricochet privacy at DuckDuckGo

telegram vs signal - Google Search
torchat vs irc vs signal - Google Search
telegram vs signal - Google Search
torchat vs irc vs signal - Google Search
How to Use Private Encrypted Messaging Over Tor « Null Byte :: WonderHowTo
The Motherboard Guide to Sexting Securely - Motherboard
telegram vs signal - Google Search
Facebook Finishes Its "Secret Conversations" Encryption Rollout to Messenger Users | WIRED
8 Best Secure And Encrypted Messaging Apps For Android & iOS
Do The Right Things: Signal Messenger vs Wire Messenger - private voice communication
Tor-based private messaging app Briar is out of beta
FBI recovers WhatsApp, Signal data stored on Michael Cohen’s BlackBerry – Ars Technica
Encrypted Messaging Apps Have Limitations You Should Know | WIRED
Anonymous Chat Apps like Signal and Whatsapp Are Only as Private as the People You Talk To
Privnote - Send notes that will self-destruct after being read
Three Reasons Not to Use Skype
Slantwise Action | How WhatsApp, Signal, and Steemit Are Feeding the Resistance
why messaging apps need encryption if it uses + "https" - Google Search
Why we still recommend Signal over WhatsApp ...even though they both use end-to-end encryption
Why I told my friends to stop using WhatsApp and Telegram
4 Whatsapp Alternatives To Protect Your Privacy | Beencrypted
Encryption - KryptoChat

Secure_Mail_Service

Third-Party Apps May Read Your Email: Learn How to Protect - definitive
How Secure Is Email?

ProtonMail

ProtonMail Hits 5 Million Accounts and Wants Users to Ditch Google by 2021 | Inverse
Hacker uses ProtonMail VPN. Hacker DDoSes ProtonMail. Hacker gets arrested. | ZDNet
"ProtonMail Contacts" world's first encrypted contacts manager is here
ProtonMail Bridge offers encryption for your go-to email client
ProtonMail will use encryption to lock down your contacts list
ProtonMail DDoS Attacks Are a Case Study of What Happens When You Mock Attackers

Comparison

Gmail vs ProtonMail: Which is More Secure? - Motherboard

The Only Reason to Still Use Yahoo Is for Your Garbage
Got a Yahoo email account Here are 3 things you need to do now - MarketWatch
Why You Should Not Use Yahoo Mail - LiteracyBase
☆ In what ways is Yahoo Mail better than Gmail? - Quora
KMail Bug Sent Encrypted Emails in Plain-Text — for 4 years - OMG! Ubuntu!
The 3 Most Secure & Encrypted Email Providers Online
Snowden's preferred secure email service is making a comeback
hackread.com/best-encrypted-email-services-2018/
How PGP can protect you against email surveillance | TechTalks
In Defense of Browser-Based Email Encryption
Reminder—Third Party Gmail Apps Can Read Your Emails, "Allow" Carefully!
Google admits third-party app developers read your Gmail emails
Who's Reading Your Gmail Messages?
4 add-ons to improve your privacy on Thunderbird - Fedora Magazine
The Definitive Guide to Email Encryption | S/MIME, PGPG/MIME - Outlook - iOS, Android - Secure/Privacy respectuous alternative email services as Hushmail, ProtonMail, Tutanota, Runbox, Mailbox - Burner/Disposable email to hide address
20 Sites to Send Anonymous Emails (2018) - Send Emails Without Registration - Disposable/Encrypted/Self-Destructing Emails

Hack Like a Pro: How to Keep Your Internet Traffic Private from Anyone - TOR, VPN, CSpace, ZRTP - Encrypted P2P Chat and VoIP - Zimmerman « Null Byte :: WonderHowTo
how to make sure a conversation is not listened on mobile - Google Search
Find out if your password has been pwned—without sending it to a server | Ars Technica
A cartoon intro to DNS over HTTPS – Mozilla Hacks – the Web developer blog
MIT CSAIL Parallel and Distributed Operating Systems Group
How To Encrypt BitTorrent Traffic – Complete Guide
Can we trust closed encryption protocols? | Two Cents Security

Privacy_In_The_Cloud

Do VPS providers look inside your VPS? | Web Hosting Talk
Can we trust cloud providers to keep our data safe? - BBC News
Just how trustworthy are your public cloud services? - TechGenix
How Reliable is the Cloud? | NIRIX
The cloud: will it ever be trustworthy enough for your precious data? | TechRadar
Avoid this privacy folly when sharing on Google Docs | TechTalks

Public_Computer_Usage

If I open a document from a USB flash drive but do not save it to the computer, can someone access the file’s contents after I remove the drive? - Super User

Physical-Personal_Privacy

Personal_Geolocation_Privacy

Shoddy security of popular smartwatch lets hackers access your child’s location
Location tracking | physical privacy - GPS tracking - Me and my Shadow
T-Mobile, Sprint, and AT&T Are Selling Customers' Real-Time Location Data, And It's Falling Into the Wrong Hands - Privacy Violation, Surveillance, Geolocation/Physical Privacy
Locational Privacy - geolocation

Seeker v1.0.7 - Get Accurate Location using a Fake Website - KitPloit - PenTest Tools for your Security Arsenal ☣

Identity_Theft

How Your Mouse Movement Could Be Used to Stop Identity Theft
Credit Freezes are Free: Let the Ice Age Begin — Krebs on Security
why social security number is sensitive at DuckDuckGo

can the border police compels you to unlock your laptop at the airport at DuckDuckGo
Why Location Privacy Matters
How to stop Android apps from accessing your location | AndroidPIT
How to stop Google from tracking you on Android and iPhone
Facial Recognition and Public Privacy
Streisand effect - privacy enforcement reverse effect - personal privacy - Wikipedia
How does Tor protect against an attacker just running thousands of nodes? - Information Security Stack Exchange
StreisandEffect/streisand - Bypass censorship · GitHub

Anonymity

4Nonimizer - A Tool For Anonymizing The Public IP Used To Browsing Internet, Managing The Connection To TOR Network And To Different VPNs Providers - KitPloit - PenTest Tools for your Security Arsenal ☣

Deep_Web-Dark_Web

Tracking_Tools_Against_Darknets

DarkOwl - Darknet Big Data

Tor

Tor_Weaknesses

Exit_Node_Dangers

Tor exit node admin acquitted of aiding terrorism – Naked Security
How much information can be sniffed at tor exit nodes - Information Security Stack Exchange
The risk to Tor exit nodes - Information Security Stack Exchange

Misconfigured Tor sites using SSL certificates exposing public IP addresses
Tor Browser Zero-Day Exploit Revealed Online – Patch Now
Security firm uses Twitter to disclose critical zero-day flaw in Tor Browser
Public IP Addresses of Tor Sites Exposed via SSL Certificates
is it possible to conduct ddos attack against Tor - Google Search
New attack on Tor can deanonymize hidden services with surprising accuracy | Ars Technica
is it possible to conduct ddos attack against Tor - Google Search
How the NSA (Or Anyone Else) Can Crack Tor's Anonymity - Motherboard
"One cell is enough to break Tor's anonymity" | Tor Blog
81 percent Tor users is identifiable with traffic analysis attackSecurity Affairs
is it possible to conduct ddos attack against Tor - Google Search
https://www.google.com/url?sa=t&rct=j&source=web&url=https://security.radware.com/uploadedfiles/resources_and_content/attack_tools/shooting_behind_the_fence_ert_research_paper.pdf&ved=2ahUKEwjS1oyWqbDXAhUDmoMKHcZaAawQFjADegQIBxAB&usg=AOvVaw2fAfOYMsIOckugL
Tor Browser Updates Patch IP Leaking TorMoil Bug - Deep Dot Web
German Intelligence First Developed Attacks Against Tor
The FBI Booby-Trapped a Video to Catch a Suspected Tor Sextortionist - Motherboard
Don't Use This "Fake TOR Browser" — Scammers Are Fooling People
entry guards | Tor Blog
sybil attack tor at DuckDuckGo
Sybil attack - Wikipedia
How to make Tor less vulnerable to RAPTOR attacks - TechRepublic
Improving Tor's anonymity by changing guard parameters | Tor Blog
Can you trust Tor’s entry guards? – Naked Security
tor entry point dangers at DuckDuckGo
Tor Project: FAQ
Tor Project: Bridges
Tor Project: FAQ
how to traceroute tor proxy and see other routers in tor network? - Stack Overflow
Cybercriminals Stealing From Cybercriminals Ransomware Victims Left StrandedSecurity Affairs
Tor Project "Almost 100% Funded By The US Government": FOIA | Zero Hedge
Why BBG needs Tor & its influence over the ‘anonymous browser’ — RT US News
determining tor origin traffic - Google Search
Is Tor Safe? | Assessing 5 Claims About Tor’s Security
Tor Browser - What You Really Need to Know (Read This First) - VPN vs Tor - definitive enumeration of all Tor weaknesses and risks - Military use of Tor, U.S government fund, Snowden promotion of Tor - Multi-Hop VPNs providers NordVPN among others - Self-configurable multi-hop VPNs, Perfect Privacy and Zorro VPN among others - Virtual machines VMs with VPNs, nestes VPN chains, VPN within a VPN - VPN and Tor combination, VPN service that has servers exiting onto the Tor network, NordVPN and ZorroVPN among others -
privacy - Best practices for Tor use, in light of released NSA slides - definitive guide on how to effectively use Tor to mitigate its inherent risks - Information Security Stack Exchange
webserver - What are the disadvantages of Tor? - Information Security Stack Exchange
What is the Tor Network and Browser and how can you use it safely? Tor over VPN, VPN over Tor - China Ban - Tor Messenger, Atlas, Nyx, Onionoo, OONI, Pluggable Transports, Shadow, Tails, TorBirdy, Tor2Web -
How DNS can be used to unmask Tor users | Weaknesses - Anonymity
Things to Avoid While Accessing the Deep Web – vs Dark Web
TOR Anonymity: Things Not To Do While Using TOR - IMEI Phone Tracking - Anonymmity vs Pseduonymity - HTTP on Tor - Google on Tor
11 Do's and Don'ts of Tor Network - Tor on Windows - Using real email - Peer to peer P2P - LUKS FDE - HTTP -

anon surf module equivalent on kali - Google Search
how to route all traffic through tor on linux - Google Search
anon surf change identity feature - Google Search
How to Install TOR on Android and iOS Devices
benefit of running own tor relay - Google Search
GitHub - Und3rf10w/kali-anonsurf: A port of ParrotSec's stealth and anonsurf modules to Kali Linux
Tor Project: Abuse FAQ
Tor Project: Projects Overview
benefit running own tor relay node - Google Search
5 Ways to Stay Safe From Bad Tor Exit Nodes
legal - What are the implications of running a TOR non-exit relay node? Traffic Analysis - plausible deniability - Information Security Stack Exchange
Connecting to an authenticated Onion service · AnarchoTechNYC/meta Wiki
Meet Nyx, a Command-Line Tor Relay Monitor | Tor Blog
We’re Upping Our Support to Mobile Browsing | Tor Blog
Anonymous Browsing in a Click: Add a Tor Toggle Button to Chrome « Invisible Computer :: WonderHowTo
5 Good Reasons to Give Tor a Try
What is Tor?
Can I detect when someone is connecting to my server via Tor? - Tor Stack Exchange
Tor Project: FAQ
how do onion sites browsing actually work - Google Search
.tor - Wikipedia
new identity feature tor - Google Search
new identity vs change tor circuit for this site tor - Google Search
how to route all traffics through tor kali linux - Google Search
Tor exit node vs Tor relay nodes - Google Search
what are tor hidden services - Google Search
www.google.com
Tor's Fall Harvest: the Next Generation of Onion Services | Tor Blog
Même le réseau Tor n'échapperait pas à la surveillance de la NSA et du GCHQ, selon un expert en sécurité
The Grand Tor: How to Go Anonymous Online | WIRED
tor choose exit node - Google Search
Tor Project: Overview
GitHub - ruped24/toriptables2: Tor Iptables script is an anonymizer that sets up iptables and tor to route all services and traffic including DNS through the Tor network.
Nipe - A Script To Make TOR Network Your Default Gateway - KitPloit - PenTest Tools for your Security Arsenal ☣
Multitor - A Tool That Lets You Create Multiple TOR Instances With A Load-Balancing - KitPloit - PenTest Tools for your Security Arsenal ☣
what are bridges in tor at DuckDuckGo
no internet access with orbot on android at DuckDuckGo
doc/TransparentProxy – Tor Bug Tracker & Wiki
doc/Torouter – Tor Bug Tracker & Wiki
This is What a Tor Supporter Looks Like: Edward Snowden | Tor Blog
Setting up an exit node on VPS along with a VPN. Impact to anonymity? - Tor Stack Exchange
Can somebody clarify the Tor --> VPN and VPN --> Tor notation please? - Tor Stack Exchange
Five Years as an Exit Node Operator | Tor Blog
Why would anyone setup a TOR relay? Time correlation attacks : TOR
Really Private Browsing: An Unofficial User’s Guide to Tor
Tor (anonymity network) - Onion Services - Security Weaknesses - Heartbleed - Security/Privacy-focused operating systems
Introducing DNS Resolver for Tor
Is there a domain name resolution when you access a .onion website? Can a .onion be converted into an IP address? How does it work? - Quora
Achieving Anonymity with Tor Part 1
https://resources.infosecinstitute.com/tor-part-2/

I2P

Through A Network, Darkly | A Geographic Look At I2P
I2P | An Infographic
I2P Services | A Curated Guide to I2P
I2P - Wikipedia
How to set up untraceable websites (eepsites) on I2P
I2P Guide: How to Use I2P and More!
How To Use I2P | I2P Tutorial & Setup Guide

I2P_Weaknesses

Darknets and hidden servers:Identifying the true IP/network identity of I2P service hosts

FreeNet

Onion_Service_Protocol

hidden services - .onion Domains DNS lookup - Tor Stack Exchange
.onion - .exit -
Onion routing - security weaknesses
Tor: Onion Service Protocol
Tor: Onion Service Protocol - definitive official explanation of hidden services access - search engine
How does DNS resolving work for Tor Hidden Services? Search Engines - definitive breakdown of hidden services acces - hash table mapping .onion addresses to hidden services descriptors
Cooking With Onions: Names for your onions | Onion Addresses - hidden services

Anonymity_Networks_Comparison

Tor vs I2P Review : privacy
I2P Compared to Tor - I2P
Anonymity Networks. Don't use one, use all of them! « Null Byte :: WonderHowTo
I2P vs. Tor vs. VPN: Which Is More Secure?
Tor vs. I2P: The Great Onion Debate « Null Byte :: WonderHowTo
Kushal Bahirwani's answer to In your opinion is it better to use Tor, I2P or GNUnet? - Quora
Tor and Its 10 Best Alternatives
I2P vs TOR: What are the Major Differences
I2P Compared to Tor and Freenet - I2P
Tor vs. I2P — DarkOwl - Darknet Big Data

Hidden_Services_Lists

Deep Web Search Engines to Explore the Hidden Internet
Ex-Facebook Engineer Creates Wikipedia Dark Web Version
How to Find Active .Onion Dark Web Sites (And Why You Might Want To)
The Best Dark Web Websites You Won't Find on Google - Dark Web vs. Deep Web
List of Tor onion services - Wikipedia

how to route all traffics through i2p kali linux - Google Search
how to route all traffics through i2p kali linux - Google Search
Dark web doesn't exist, says Tor's Dingledine. And folks use network for privacy, not crime • The Register
Hiding out among the net's criminal class - BBC News
How to Install ParrotSec Sealth and Anonsurf Modules on Kali 2.0 « Null Byte :: WonderHowTo
benefit of https for onion server - Google Search
.bit - Wikipedia
how to route all traffics through i2p kali linux - Google Search
Anonymity, Darknets and Staying Out of Federal Custody, Part One: Deep Web « Null Byte :: WonderHowTo
why are onion addresses not human readable - Google Search
6 Reasons You Should Avoid the Dark Web
What Is the Dark Web?
The Internet you can't Google
Deep Web Search Engines List to Explore Dark Web - DuckDuckGo
Dark Web Links | Dark Web Sites - Reference - Recommended Steps Everyone Should Follow before Exploring Dark Web Links - Tor - Bitcoin, Monero
Deep Web Books Links | Dark Web eBooks Sites
18 Deep Web Stories: Horror, Scary, Creepy & Disturbing (+True)
Google Can’t Search the Deep Web, So How Do Deep Web Search Engines Work? Why Standard Search Engines Can't Crawl/Index Deep/Dark Web
Darknet - Wikipedia
Dark web - Wikipedia
Why can't we access the sites in the Deep Web (Onion/Tor) without a specially built browser? - Quora
How to Access Onion Sites - with VPNs
How to Access the Dark Web and the Deep Web, Safely and Anonymous - Tor with VPN, Tails OS

References

Why can't search engines reach the dark web? - Information Security Stack Exchange
Why doesn't Google index the Dark Web / Deep Web? - standard search engine
hidden services - How do I find onion sites? - Tor Stack Exchange
Best of Two Worlds: Accessing I2P and Tor (and clearnet) seamlessly with Orchid
why onion sites cannot be reached though classic search engine at DuckDuckGo

Deep_Web_Search_Engines

Deep Web Search Engine alternative to Google for 2019 - Top 10
10 Must-Have Tor / Darknet Search Engines for the Dark Web- dr.fone

Anonymity_Throughout_Attack_Processes

TimpDoor Android malware turning devices into hidden proxies
Dark web kingpin visiting US for beard competition gets 20 years in prison
Russian man charged over 'massive' US hack attacks - BBC News
Russian Hacker Pleads Guilty to Operating Kelihos Botnet
Russian man pleads guilty, admits he ran notorious Kelihos botnet | Ars Technica
TypoGuy Explaining Anonymity: A Hackers Mindset « Null Byte :: WonderHowTo
How to Stay Anonymous While RATting (Level: Paranoid) - VPN, No-IP - worn second-hand laptop - RAT, VPN jurisdiction, No-IP « Null Byte :: WonderHowTo
Keeping Your Hacking Identity Secret « Null Byte :: WonderHowTo
how to edit wikipedia anonymously - Google Search
is it possible to be caught when using public wifi at DuckDuckGo
tor vs vpn for hacking at DuckDuckGo
How to Remove Your Online Identity: The Ultimate Guide to Anonymity and Security on the Internet « Null Byte :: WonderHowTo

Anonymous_Online_Payment

Cryptocurrency_Anonymity

Ledger Nano S Review | Why You Need a Bitcoin Hardware Wallet
Home | Monero - secure, private, untraceable
Cryptocurrency Monero Is Skyrocketing Thanks to Darknet Druglords | WIRED
Monero vs DASH vs Zcash vs Bitcoin Mixers
Is Bitcoin Actually Private?
https://en.wikipedia.org/wiki/Zcash
https://www.quora.com/What-is-a-good-Anonymous-Crypto-Currency
https://duckduckgo.com/?q=zcash+vs+bitcoin&t=ffab&ia=web
https://www.coindesk.com/the-structure-and-valuation-of-zcash-vs-bitcoin/
https://www.buybitcoinworldwide.com/zcash/
https://z.cash/
https://www.monero.how/why-monero-vs-bitcoin
https://www.monero.how/how-does-monero-privacy-work
https://duckduckgo.com/?q=monero+vs+bitcoin&t=ffab&ia=web
https://www.dash.org/
https://duckduckgo.com/?q=dash+vs+zcash&t=ffab&ia=cryptocurrency
https://www.comparitech.com/crypto/anonymous-cryptocurrency-monerto-zcash/
https://duckduckgo.com/?q=privacy+cryptocurrency+bank+transfer&t=ffab&ia=web
https://duckduckgo.com/?q=cash+out+crypto+currency+anonymously&t=ffab&ia=web
https://www.quora.com/What-is-the-most-private-Monero-or-Zcash
https://www.quora.com/If-one-opens-a-crypto-currency-account-anonymously-how-does-he-cash-out
https://duckduckgo.com/?q=electrum+wallet&t=ffab&ia=web
Bitcoin Private - Wikipedia

Your Sloppy Bitcoin Drug Deals Will Haunt You for Years | WIRED
paying anonymously on internet at DuckDuckGo
paying a vpn anonymously at DuckDuckGo
can you be tracked if you pay in bitcoin at DuckDuckGo
paypal vs debit card at DuckDuckGo

Internet_Relay_Chat

How to Host a Deep Web IRC Server for More Anonymous Chatting « Null Byte :: WonderHowTo
ZNC - IRC bouncer
Hack Like a Pro: How to Install & Use a Secure IRC Client with OTR - Off The Record - Internet Relay Chat - Null Byte - WonderHowTo
IRC Guide - Internet Relay Chat - HexChat installation guide
Are there any security risks to using IRC? Internet Relay Chat : irc
botnet - How is IRC so secure/untraceable that hackers and pirates use it to communicate? Internet Relay Chat IRC security - botnet, control and command C2 servers - privacy, anonymity, use of proxy/vpn
Internet Relay Chat - Security, Attacks, takeovers, ICMP based DDoS - services - clients, bots, bouncers - SDCC - character encoding format
Comparison of Internet Relay Chat IRC daemons - Wikipedia
IRCd - daemon - IRC server - vs bot, client - ports 6665 to 6669, with 6667 being the historical default
Comparison of mobile Internet Relay Chat clients - Wikipedia
IRC bot - Wikipedia
Direct Client-to-Client/Connections - DCC - IRC-related sub-protocol enabling peers to interconnect using an IRC server for handshaking in order to exchange files or perform non-relayed chats. Once established, a typical DCC session runs independently from the IRC server
Pidgin (software) - Off The Record OTR Messaging - IRC
irc: message notification when away (xchat) - znc
Having Slack-like features on IRC? : irc
DCC through a heavily firewalled ZNC? : irc
How to Use ZNC - YouTube
Is there a benefit to using ZNC on my VPS or just having weechat running on it all the time? : irc
Learn how to install and use the ZNC chat bouncer | definitive IRC client/server configuration - HexChat
ZNC_IRC_bouncer - Debian Wiki
ZNC - IRC
FAQ - ZNC
IRC Bouncer on a Pi | ZNC
Tails - Chatting with Pidgin - IRC over OTR - Tor
Freenode - formerly known as Open Projects Network, is an IRC network used to discuss peer-directed projects
Comparison of Internet Relay Chat IRC clients - OTR support
ZNC - IRC BNC bouncer - IRC server
BNC (software) - Bounced Network Connection - privacy - IRC Proxy
does irc support encryption? | Hacker News
tcp - Is SSL/TLS pointless for IRC? hash - MitM
Improving IRC security step by step - SSL/TLS, Strict Transport Security - MitM - OTR -
otr - ZNC - IRC
irc cheat sheet · GitHub
IRC Wiki - The Internet Relay Chat wiki - clients, bots and servers
OTR.im - Whispering Off The Record - compatible instant messaging clients - IRC
Wikipedia:IRC/Tutorial - clients
Connecting to IRC with HexChat - IRC Wiki
Beginner's guide to IRC - Fedora Magazine

Personal_Anonymity

Physical_Anonymity

is it possible to erase your fingerprints - Google Search
is it possible to erase your fingerprints - Google Search
10 Best Voice Changer Apps - You Must Download - Tech in Mind
is it possible to erase your fingerprints - Google Search

Speech_Pattern_Obfuscation

rephrase tool at DuckDuckGo

How to Become Anonymous & Browse the Internet Safely « Null Byte :: WonderHowTo
TypoGuy Explaining Anonymity: Your Real Identity « Null Byte :: WonderHowTo
How to Stay as Anonymous as Possible Online « Null Byte :: WonderHowTo
How to be Anonymous: Beginner Level Part -4 - Develope IT
How to Hide Your IP Address in PC and Smartphone for Online Security
How to Change your IP address in five different ways « Internet :: Gadget Hacks
How to Use a proxy with Firefox to hide your IP address « Internet :: Gadget Hacks

VPNs

VPN_Weaknesses

Don't ever use a VPN without paying attention to these five things
Almost Every Major Free VPN Service is a Glorified Data Farm
Security Holes Discovered in 2 Popular VPN Services - ExtremeTech
Privilege Escalation Bug Found in Popular VPN Clients
Don't use VPN services. - VPNs weaknesses

Theory

VPNs_Protocols

s2s vpn at DuckDuckGo
Generic Routing Encapsulation - GRE - vs PPTP, IPSec
Point-to-Point Tunneling Protocol - PPTP - VPNs - security vulnerabilities -MPPE, PPP, MS-CHAP-v1,MS-CHAP-v2, EAP-TLS - GRE
Layer 2 Tunneling Protocol - Tunneling protocol used to suppport VPNs - L2TP
Secure Socket Tunneling Protocol - SSTP - VPN Protocol
OpenVPN - custom security protocol that utilizes SSL/TLS for key exchange.
SoftEther VPN - is free open-source, cross-platform, multi-protocol VPN client and VPN server software
OpenConnect is an open-source software application for connecting to virtual private networks (VPN), which implement secure point-to-point connections - Cisco AnyConnect
IPsec - Internet Protocol Security - VPN Protocol - As a part of the IPv4 enhancement, IPsec is a layer 3 OSI model or internet layer end-to-end security scheme - vs TLS, SSH
What is GRE Tunnel - Generic Routing Encapsulation - vs IPSec VPN - DDOS - Definitive breakdown
Use cases for GRE over IPSEC - MPLS over GRE over IPSec - EIGRP, GRT, IKEv1/2,
What is the difference between L2TP vs GRE - L2F layer 2 forwarding
How IPsec tunnel mode work without GRE - Network Engineering Stack Exchange
Does GRE Tunneling "really" hide your main IP? GRE is an unencrypted tunnel protocol - government subpoena, VPN ,Tor
How GRE Tunnels Work | VPN Tunnels Part 1 - YouTube
What are the differences between an IPSec VPN and a GRE tunnel? leased-line WAN - multicast traffic forwarding

The race towards convergence is what awaits VPNs | TechRadar
What Is a VPN, and Why Would I Need One?
Putin bans VPNs in web browsing crackdown - BBC News
Private Internet Access – Get a Secure VPN to Protect Your Online Privacy
OpenVPN Access Server is an SSL VPN based on open source software
Hotspot Shield VPN Accused of Spying On Its Users' Web Traffic
ProtonMail makes its free VPN service available to everyone
file:///media/programmersn/NOUAIM/Studies/Documentation/Computer_science/Security/wp-do-you-need-a-vpn-firewall-or-both.pdf
file:///media/programmersn/NOUAIM/Studies/Documentation/Computer_science/Security/WP_CS_VPN.pdf
A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients
Anonymity and Privacy Techniques - YouTube
Virtual Private Networks, an Introduction - YouTube
ما هو الـ proxy ؟ ما الفرق بين ال Proxy و الـ VPN ؟ - YouTube
What is a VPN? - Gary explains - YouTube
Everything Linux Users Need to Know About Installing a VPN
VPN - The Must Have Anonymity Tool | Dark Web News
A VPN can stop internet companies from selling your data — but it’s not a magic bullet - The Verge
What to look for in a VPN to protect your privacy | Computerworld
vpn with warrant canary - Google Search
how better is a vpn from https - Google Search
network - What is the difference in security between a VPN- and a SSL-connection? - Information Security Stack Exchange
VPNs: What They Do, How They Work, and Why You're Dumb for Not Using One
hidemyass - Google Search
hotspotshield - Google Search
expatshield - Google Search
proxpn - Google Search
Tor Project: FAQ
A VPN can protect your online privacy. But there's a catch - CNET
5 Common VPN Myths and Why You Shouldn't Believe Them
TypoGuy Explaining Anonymity: Choosing a Good VPN « Null Byte :: WonderHowTo
Finally, A VPN explanation for the non-technical world
Virtual private network - GRE
The 5 Major VPN Protocols Explained
How VPNs Work to Protect Privacy, and Which Ones to Use | WIRED
Can A VPN Bypass Net Neutrality Rollback And Throttling? — Here Are 3 Top Services To Help You
7 Tips on How to Use a VPN Like a Boss
How a VPN download can save you a lot of money - Android Authority
VPN vs Cloudflare DNS | TechRadar
7 Reasons Why VPNs Might Die Out by 2020
5 Ways Your VPN Is Not as Private as You Think It Is
Does VPN Alone Provide Web Anonymity? No, but It Comes Close with Tor and More - N

Practice

Building_Own_VPN

how a own hosted vpn is better - Google Search
how a own hosted vpn is better - Google Search
How to build your own VPN if you’re (rightfully) wary of commercial options | Ars Technica
how a own hosted vpn is better - Google Search
How I made my own VPN server in 15 minutes | TechCrunch
How to Set Up Your Own Completely Free VPN In the Cloud
anonymity - What are the advantages of paying for a VPN service as opposed to hosting your own? - Information Security Stack Exchange
Nyr/openvpn-install: OpenVPN road warrior installer for Debian, Ubuntu and CentOS
prometheus cloud - Google Search
ramnode dmca - Google Search
seedbox - Google Search
web seeds - Google Search
vpn on vps - Google Search
What is the risk of running VPN on VPS? - Information Security Stack Exchange
How to set up and run your own VPN server on Windows | PCWorld
6 open source tools for making your own VPN | Opensource.com
Set Up Your Own VPN, Without the Expensive Software
How to Set Up Your Own Home LAN VPN Server - performance/bandwidth concerns
OpenVPN vs IPSec, WireGuard, L2TP, & IKEv2 (VPN Protocols 2019) - definitive

VPN_Providers

Researcher Claims Hotspot Shield VPN Service Exposes You on the Internet
ProtonVPN Subscriptions Now Available on Firefox for $10
Be cautious, free VPNs are selling your data to 3rd parties
Pornhub's VPNhub is a free VPN for everyone
The best VPN service
Leaking VPNs: 17 VPN Services Found To Leak Your IP Address
How a VPN is Saving My Butt in Europe
No Logs VPN Services That Have Actually Been Proven True
I Am Anonymous When I Use a VPN - 10 Myths Debunked - privacy, vs TOR, VPN provider | Golden Frog
Best VPN Services 2019 (What You're Not Being Told) - definitive criterias presentation | RestorePrivacy
Perfect Privacy VPN Provider - Multi-Hop: Advantages of a cascaded VPN connection
Hotspot Shield - Free VPN service
Definitive comparison of virtual private network services - Anonymous Payment methods

How Get Free Movies and TV Using a VPN
This Massive VPN Comparison Spreadsheet Helps You Choose the Best for You
How to Chain VPNs for Complete Anonymity « Null Byte :: WonderHowTo
7 open source VPN tools for businesses | Opensource.com
How to Check if Your VPN Connection is Actually Encrypted
Multi-Hop VPNs for Maximum Privacy & Security (How-To Guide)
How to Set Up IPsec LAN To LAN VPN Tunnel Main Mode between Two Vigor Routers - YouTube
IPsec Tunnel in Main Mode between DrayTek Routers | DrayTek
Configuring LAN-to-LAN IPsec VPNs
How To Setup VPN On Router & Secure All Devices
5 Best DD-WRT Routers 2019| How to Install DD-WRT VPN - ProPrivacy.com
Best VPN routers 2019: the best routers for Virtual Private Networks | TechRadar
How to build a VPN client on a secondary home LAN router - definitive hands-on detailed guide - DD-WRT - | TechRadar
4 Reasons to Set Up a VPN client on Your home LAN Router (Instead of Your PC)
Setting Up a Router VPN client : The Ultimate Guide - pre-flashed VPN routers, flashing VPN router with VPN compatible firmware - definitive tutorial | TheBestVPN

Why Is Everyone Talking About VPNs?
The Laziest, Cheapest Way to Circumvent Your Snooping ISP
Why You Should Get a VPN for Your Xbox One or PS4
Privacy in America Now Starts With a VPN | A Brief Note on Threat Modelling and Lesser Evils
From cybercrime to cyber defence: How VPNs went mainstream

Proxies

How To Use Google As Proxy Server – Incognisys
What is a Proxy? - YouTube
How To Use Proxychains To Evade Detection in Kali Linux - Coding Security
sock5 proxy what is - Google Search
do proxies use unlimited bandwidth - Google Search
What are the best internet proxies that are good for high bandwidth content? - Quora
How to Sneak Past Web Filters and Proxy Blockers with Google Translate « Null Byte :: WonderHowTo
What is a Proxy Server and should you risk using one?
How to Browse securely with SSH and a SOCKS proxy « Internet :: Gadget Hacks
How to View blocked sites with a free proxy website « Internet :: Gadget Hacks
How to Get passed blocked sites using proxy servers « Internet :: Gadget Hacks
How to Use a proxy and understand why they are important « Internet :: Gadget Hacks
Hack Like a Pro: How to Evade Detection Using Proxychains « Null Byte :: WonderHowTo
tor - how to verify that proxychains is working - Super User

Anonymity_Tools_Comparison

why would we need vpn if we have https - Google Search
anonymity - Security of Tor compared to VPN - Tor Stack Exchange
4 Easy Ways to Hide Your IP Address [Updated]
We know that VPN and proxy change IP addresses, but what is the difference between them? | Virtual Private Networks
proxifier vs proxychains at DuckDuckGo
encryption - Is using Tor and VPN combination more secure? - Information Security Stack Exchange
encryption - Is using VPN, Tor and ProxyChains together more secure? - Information Security Stack Exchange
Tor Project: FAQ
Tor And VPN | Using Both For Added Security
Tor or VPN - Which is Best for Security, Privacy & Anonymity? [2019]
Tor or VPN – Which is Best for Security, Privacy & Anonymity? Advantages When Used Together - Tor over VPN, VPN over Tor- BinaryHints
What's the difference between privacy and anonymity? Comparison TOR vs VPNs vs Proxies - Information Security Stack Exchange
anonymity - VPN vs VPS vs TOR vs ANON_PROXY? - Information Security Stack Exchange
privacy - Why is Tor safer than a proxy? - Information Security Stack Exchange

Resources

Search Encrypt Blog - Privacy and Cybersecurity Tools, Tricks and News

Misc_Private-Anonymous_Tools_Alternatives_Lists

Privacy Tools - How to Restore Your Online Privacy in 2019
GitHub - nikitavoloboev/privacy-respecting: Curated List of Privacy Respecting Services and Software Alternatives
Opt out of global data surveillance programs like PRISM, XKeyscore, and Tempora - PRISM Break - Privacy-respectuous and security-aware alternatives to proprietary software - PRISM Break
PRISM Break - source code · GitLab
Alternatives to Google Products (Complete List) | Restore Privacy
What's YOUR Privacy Setup? good privacy respectuous alternatives suggestions - privacytoolsIO
A New World of Opportunity — Inrupt
One Small Step for the Web… – Tim Berners-Lee – Medium
25 Google Alternatives - Take Control of Your Privacy
8 of the Best Google Maps Alternatives You Should Try – Make Tech Easier
how to stop using google while using android at DuckDuckGo
Here's How You Can Use Android But Ditch Google

Anti-Forensics - Rendering Digital Investigations Irrelevant. - privacy/anonymity resources
Resources - Privacy.net
One man's fight against the invasion of our privacy online | Privacy.net
Surveillance Self-Defense | Tips, Tools and How-tos for Safer Online Communications
Privacy Tools - Encryption Against Global Mass Surveillance - warrant canary - Snowden quotes - Nothing to hide argument
Restore Privacy - privacy respectuous alternative tools| Your online privacy resource center
Home | Me and my Shadow
Be Encrypted - Fight Against Data Theft & Cybercrime
The Tin Hat
Electronic Frontier Foundation | Defending your rights in the digital world
About Free Software Foundation Europe - FSFE - privacy/anonymity resources

Privacy vs. Anonymity - for VPN, among others -- vpn.ac | blog
Anonymity vs Privacy vs Security

Cyber-Warfare

The US Didn’t Sign the Paris Call for Trust and Security in Cyberspace | WIRED
The Collateral Damage of Trump's Extreme Declassifications | WIRED
What is cyberwar? Everything you need to know about the frightening future of digital conflict | ZDNet
How Obama Made It Easier for Trump to Launch a Nuke - POLITICO Magazine

Governmental_Intelligence_Agencies

Saudi_Agencies-Linked_Groups

Hackers deface Saudi ‘Davos in the Desert’ site against Khashoggi's death

French_Agencies-Linked_Groups

France : l'Assemblée nationale adopte le texte des propositions de loi sur les infox en période électorale, par 45 voix contre 20
Un agent de la DGSI mis en examen pour avoir vendu des informations sur le darknet, jusqu'à dévoiler votre vie complète (RIB, géolocalisation, etc.)

USA_Agencies-Linked_groups

High-Profile_Government_Operatives

Trump's Personal iPhone Would Be a National Security Risk | WIRED

Pentagon Weapons Systems Are Easy Cyberattack Targets, New Report Finds | WIRED
How the US Halted China’s Cybertheft—Using a Chinese Spy | WIRED
US weapons systems can be 'easily hacked' - BBC News
Major weapon systems developed by US DoD highly vulnerable to cyber attacks
Senate passes bill that lets the government destroy private drones

Vault7

3 New CIA-developed Hacking Tools For MacOS & Linux Exposed
3 New CIA-developed Hacking Tools For MacOS & Linux Exposed
Leaked NSA Hacking Tools Being Used to Hack Thousands of Vulnerable Windows PCs
10 Things You Need To Know About 'Wikileaks CIA Leak'
Vault 7 : WikiLeaks révèle que le logiciel Athena, utilisé dans les opérations d'espionnage de la CIA, peut infecter toutes les versions de Windows
This Is How the NSA Infiltrated a Huge Banking Network in the Middle East - Motherboard
3 New CIA-developed Hacking Tools For MacOS & Linux Exposed
CouchPotato: CIA Hacking Tool to Remotely Spy On Video Streams in Real-Time
EternalRocks worm combines seven leaked NSA attack tools
Cyberspies Are Using Leaked NSA Hacking Tools to Spy On Hotels Guests
Linux malware: Leak exposes CIA's OutlawCountry hacking toolkit | ZDNet
CouchPotato: CIA Hacking Tool to Remotely Spy On Video Streams in Real-Time
Shadow Brokers Leaks Another Windows Hacking Tool Stolen from NSA’s Arsenal
AngelFire: CIA Malware Infects System Boot Sector to Hack Windows PCs
WikiLeaks releases Manual for Linux Implant “Aeris” - gHacks Tech News
WikiLeaks: The CIA can remotely hack into computers that aren't even connected to the internet — Quartz
Wikileaks Unveils CIA's Man-in-the-Middle Attack Tool
Cisco Finally Patches 0-Day Exploit Disclosed In Wikileaks-CIA Leak
WikiLeaks Reveals 'AfterMidnight' & 'Assassin' CIA Windows Malware Frameworks
Newly Found Malware Uses 7 NSA Hacking Tools, Where WannaCry Uses 2
WikiLeaks Reveals 'Athena' CIA Spying Program Targeting All Versions of Windows

US military will finally start encrypting soldiers' emails
Here's How CIA Spies On Its Intelligence Liaison Partners Around the World
NSA vs Shadow Brokers
Kaspersky: Yes, we obtained NSA secrets. No, we didn’t help steal them – Ars Technica
The Pentagon Left Data Exposed in the Cloud
Canadians Are Worried About NSA Spying But Don’t Understand How It Happens - Motherboard
WikiLeaks Reveals CIA Teams Up With Tech to Collect Ideas For Malware Development
New NSA leak exposes Red Disk, the Army's failed intelligence system | ZDNet
CIA to continue cloud push in the name of national security | ZDNet
CIA uses a secret tool to spy on NSA, FBI and other intel partners
FBI can’t break the encryption on Texas shooter’s smartphone – Ars Technica
NSA's Ragtime program targets Americans, leaked files show | ZDNet
Hacker Who Hacked US Spy Chief, FBI & CIA Director Gets 5-Year in Prison
Here's the NSA Agent Who Inexplicably Exposed Critical Secrets | WIRED
After Criticism, US Defense Department Will Implement New Encryption Standards Next Year
Judge who once ruled against NSA metadata program tosses lawsuit | Ars Technica
NSA breach spills over 100GB of top secret data - CNET
Classified Pentagon data leaked on the public cloud - BBC News
NSA leak exposes Red Disk, the Army's failed intelligence system | ZDNet
Misconfigured Amazon S3 Buckets Exposed US Military’s Social Media Spying Campaign
Hero or Villain? NSA Moderates Its Stance on Snowden
15-Year-Old Schoolboy Posed as CIA Chief to Hack Highly Sensitive Information
FBI Bias: Trump's Criticism Justified -- Sometimes | National Review
Leaked NSA Exploits Modified To Attack Every Windows Version Since 2000
Leaked memo suggest NSA and US Army compromised Tor, I2P, VPNs and want to unmask Monero usersSecurity Affairs
NSA sent coded messages through Twitter
Personal Data of 21,426 US Marine Force Reserve Personnel Leaked
Leaked NSA Dump Also Contains Tools Agency Used to Track Other Hackers
FBI paid at least $1.3M for zero-day to get into San Bernardino iPhone | Ars Technica
My Take on FBI’s “Alternative” Method – Zdziarski's Blog of Things

NATO_Cyber_forces

Russians_Angencies-Linked_groups

Grey_Energy-Black_Energy_Groups

GreyEnergy: New malware targeting energy sector with espionage

How Russian Spies Infiltrated Hotel Wi-Fi to Hack Their Victims Up Close | WIRED
Russia GRU claims: UK points finger at Kremlin's military intelligence - BBC News
Russia’s Elite Fancy Bear Hackers Have a Clever New Trick | WIRED

APT28

apt28 hacker group at DuckDuckGo

Russian Fancy Bear hackers' UK link revealed - BBC News
Kaspersky: NSA Worker's Computer Was Already Infected With Malware
Kaspersky defends its role in NSA breach - BBC News
UK cyber-defence chief accuses Russia of hack attacks - BBC News
NSA Hacked and Spied on Huawei, Snowden Documents Say
Clock ticking down on NSA surveillance powers | TheHill
Russian intelligence reportedly breached the NSA in 2015, stealing cybersecurity strategy | TechCrunch
Russia meddled on Twitter after UK terror attacks, study says - BBC News
Russians Found One Use for Bitcoin: Hacking the 2016 US Election | WIRED
Russian Hackers Kept DNC Backdoor Longer Than Anyone Knew

Chinese_Agencies-Linked_groups

The Mysterious Return of Years-Old APT1 Malware
Chinese surveillance chips found in servers used by US technology giants: Report
Why Supply Chain Hacks Are a Cybersecurity Worse Case Scenario | WIRED
Chinese Spying Chips Found Hidden On Servers Used By US Companies
Github Attack Perpetrated by China's Great Cannon Traffic Injection Tool | Threatpost | The first stop for security news
Is Your DJI Drone a Chinese Spy? Leaked DHS Memo Suggests
Chinese hackers go after think tanks in wave of more surgical strikes | Ars Technica
Chinese hackers stole 614 gigabytes of US Navy's anti-ship missile data
La guerre sous-marine : la Chine aurait emporté un trésor inestimable, en piratant le réseau privé d'un entrepreneur de la Navy
Chinese hackers attack National Data Center using watering hole attack

UK_Agencies-Linked_groups

UK war-games cyber attack on Moscow | News | The Sunday Times
GCHQ cyber-spies 'over-achieved' say MPs - BBC News

Iranian_Angencies-Linked_groups

Iran's New Facebook Trolls Are Using Russia's Playbook | WIRED

Copy_Kittens

Experts Unveil Cyber Espionage Attacks by CopyKittens Hackers

APT33

APT33: Researchers Expose Iranian Hacking Group Linked to Destructive Malware

The Iran Nuclear Deal Unraveling Raises Fears of Cyberattacks | WIRED
DOJ Indicts 9 Iranians For Brazen University Cyberattacks | WIRED
Iranian & Russian Networks Attacked Using Cisco's CVE-2018-0171 Vulnerability

Palestinian_Agencies-Linked_Groups

Hamas hacked smartphones of over 100 IDF soldiers
Gaza Cybergang Returns With New Attacks On Palestinian Authority

Israeli_Agencies-Linked_groups

NSO Group - Wikipedia
Ex-employee stole secrets of Israeli spyware firm for dark web deals
Israel Hacked Kaspersky, Caught Russian Spies Hacking American Spies, But...

North_Korean_Agencies-Linked_groups

U.S. Charges North Korean Spy Over WannaCry and Sony Pictures Hack
DoJ Charges North Korean Hacker for Sony, WannaCry, and More | WIRED

Lazarus_Group

Lazarus group conducting malware attacks to steal Bitcoins
Lazarus Group is back, targeting Banks & Bitcoin users with phishing scam

​Phishing alert: North Korea's hacking attacks shows your email is still the weakest link | ZDNet
North Korea Hit By Konni and Inexsmar Malware After Missile Tests
Trojan malware attacks by North Korean hackers are attempting to steal Bitcoin | ZDNet

Lebanese_Angencies-Linked_groups

Dark_Carakal

Researchers Uncover Government-Sponsored Mobile Hacking Group Operating Since 2012
EFF and Lookout Uncover New Malware Espionage Campaign Infecting Thousands Around the World | Electronic Frontier Foundation
Dark Caracal APT - Lebanese intelligence is spying on targets for yearsSecurity Affairs

Canadian_Agencies-Linked_groups

Canadian spy agency releases its top anti-malware tool as free software. / Boing Boing

German_Angencies-Linked_Groups

German spy agency warns of Chinese LinkedIn espionage - BBC News
The Dutch intelligence service AIVD 'hacked' Russian Cozy Bear systems for yearsSecurity Affairs

Sweden Accidentally Leaks Personal Details of Nearly All Citizens
Not Just Criminals, But Governments Were Also Using MS Word 0-Day Exploit

Cyberwarfare - Wikipedia
Cyberwar: Hacker vs. Hacker « Null Byte :: WonderHowTo
Can We Hack the Hackers? « Null Byte :: WonderHowTo
U.S. Government issues alerts about malware and IP addresses linked to North Korean cyber attacks – TechCrunch
Cloud storage for password managers – are you for or against? – Naked Security
Wikileaks Unveils Project Protego: CIA's Secret Missile Control System
Hackers steal restricted information on F-35 fighter, JDAM, P-8 and C-130 – Naked Security
Spy Tactics « Null Byte :: WonderHowTo
Stray Wi-Fi signals could let spies see inside closed rooms | Science | AAAS
AI and Quantum Computers Are Our Best Weapons Against Cyber Criminals
Anonymous Muslim Group Confusing ISIS with Porn and Fake News
Exclusive: Tracing ISIS’ Weapons Supply Chain—Back to the US | WIRED
The secret to being a great spy agency in the 21st century: Incubating startups - TechRepublic
Defending against cyberwar: How the cybersecurity elite are working to prevent a digital apocalypse - TechRepublic
Quelles sont les cybermenaces qu'il faut le plus surveiller en 2018 ? Le MIT Technology Review nous donne ses prédictions
Six Cyber Threats to Really Worry About in 2018 - MIT Technology Review
Strava’s Global Heat Map Exposes User Locations Including Military Bases
Fitness Tracking App Found Exposing Secret US Military Locations Around The World
Trump infrastructure rush risks cybersecurity disaster - Axios
China’s plan to use artificial intelligence to boost the thinking skills of nuclear submarine commanders | South China Morning Post
AI is the new battleground in geopolitics - Axios
Vladimir Putin’s Nuclear-Powered Cruise Missile Is ‘Batshit Crazy’ - Motherboard
White House quickly improves email security after report - Axios
trum-kim-jong-un-direct-number-bad-idea
Trump and Kim USB fan raises cyber-security alert - BBC News
How NATO Defends Against the Cyberattacks | WIRED
The Bleak State of Federal Government Cybersecurity | WIRED
How a Former US Spy Chief Became Trump’s Fiercest Critic | WIRED
In time for hacking season, the US has no cybersecurity coordinator
iran-nuclear-deal-cyberattacks
Cyberwar: Greek & Turkish hackers target each other's media outlets
Russian hackers sent death threats to US army wives posing as ISIS: Report
Israeli Teen Accused of Running Bomb Threat Service Against Jewish Community Centers On Dark Web
Fake five-star reviews being bought and sold online - BBC News
Cyber-Attacks on US Critical Infrastructure Linked to Cisco Switch Flaw
"Don’t Mess With Our Elections": Vigilante Hackers Strike Russia, Iran - Motherboard
crypto-war-clear-encryption
Android malware on Play Store targeting Palestinians on Facebook
The Air Force Is Already Betting on SpaceX's Brand-New Falcon Heavy | WIRED
The Pentagon Is Building a Dream Team of Tech-Savvy Soldiers | WIRED
UK launched cyber-attack on Islamic State - BBC News
New cyber weapons are here and no one is prepared, experts say
Hacker Puts Airport's Security System Access On Dark Web Sale For Just $10
Stolen sensitive drone files sold on dark web - BBC News
Hacker Sold Stolen U.S. Military Drone Documents On Dark Web For Just $200
Hacker selling classified information on MQ-9 Reaper Drone on dark web
Online trolls and fake accounts poison Arab social media - BBC News
Why It's So Hard to Make Nuclear Weapons
How Did Radiation Affect the 'Liquidators' of the Chernobyl Nuclear Meltdown?
Cyberattack - cyber warfare
Cyberterrorism - Wikipedia

Forensics

Android forensics study group · AnarchoTechNYC/meta Wiki
anti forensic tool - Google Search
Windows Memory Forensics: Close to Release | Cerbero Blog
Kali Forensics « Null Byte :: WonderHowTo
ForensicsWiki
An Introduction to Computer Forensics
GitHub - Flo354/Androick
Breach detection with Linux filesystem forensics | Opensource.com
Forensics « Null Byte :: WonderHowTo
Top 7 Most Popular and Best Cyber Forensics Tools

Reverse_Engineering-Software_Cracking

Theory_and_Fundamental_Assembly_Dissassembly_Techniques

RE4B

GitHub - dennis714/RE-for-beginners: "Reverse Engineering for Beginners" free book
"Reverse Engineering for Beginners" free book

Executable_File_Formats

On_ELF_Format

Executable and Linkable Format 101 - Part 1 Sections and Segments - Intezer
x86 - What is PLT/GOT? - Reverse Engineering Stack Exchange
The ELF Object File Format by Dissection | Linux Journal
Technovelty - PLT and GOT - the key to code sharing and dynamic libraries - linking
DWARF - Wikipedia
The 101 of ELF files on Linux: Understanding and Analysis - Linux Audit
ELF Sections & Segments and Linux VMA Mappings | nairobi-embedded
linux - What's the difference of section and segment in ELF file format - Stack Overflow
The ELF format - how programs look from the inside - Christian Aichinger's thoughts
How to determine endianness of an object file in ELF format ? LSB ELF header-- Stack Overflow
ELF Hello World Tutorial - Ciro Santilli
How can I examine contents of a data section of an ELF file on Linux? - Stack Overflow
Understanding the ELF – James Fisher – Medium
Linux: Understanding the Memory Layout of Linux Executables · GitHub
ELF Format - OSDev Wiki

On_Mach-O_Format

On_PE_Format

Portable Executable - Wikipedia

Compatibility_Layers

Wine (software) - Wikipedia
Compatibility layer - Wikipedia
Windows Subsystem for Linux - Wikipedia
mono vs wine - Recherche Google
Difference between Wine and Mono - Conditions for a binary to run on a host system - Ask Ubuntu
Are there any advantage using Wine over VM to run Windows programs? (or Vice Versa) - Ask Ubuntu
Wine (or POL) vs VirtualBox | Peterborough Linux User Group
How is Windows Subsystem for Linux different from running Linux on Windows in a VM? - Quora
virtual machine vs compatibility layer - Recherche Google

Comparison of executable file formats - Wikipedia
Why do we need a format for binary executable files - Software Engineering Stack Exchange
pics/README.md at master · corkami/pics · GitHub
iPhone cpu architecture vs android cpu architecture - Google Search
mach-o vs elf - Google Search
How does the Mach-O format differ from the ELF format? - Quora
what architecture iphone cpu have at DuckDuckGo
why does android use arm at DuckDuckGo
windows - PE and ELF binary code differences - Stack Overflow
Can I run a Windows .exe file on Linux? - Run PE binary on linux - Super User
Why won't windows exe's work on Linux? - Run PE binary on linux - Super User
LIEF - Library to Instrument Executable Formats
Executable - Wikipedia

Understanding_The_Linking-Loading-Executing_Processes

Object file - Wikipedia
Linker (computing) - Wikipedia
Loader (computing) - execve system call handler - program entry point _start
Dynamic loading - Wikipedia
Dynamic/Runtime linker - ld.so - late linking
Library (computing) - locating libraries at runtime - Wikipedia
Direct binding - Wikipedia
Late binding - dynamic binding, or dynamic linkage - runtime - vs early/static binding - virtual keyword C++ function, virtual table vtable
Static library - Wikipedia
Dynamic-link library - Wikipedia
DLL Hell - Wikipedia
prelink - Wikipedia
gold (linker) - Wikipedia
GNU linker - Wikipedia
Relocation (computing) - relocatable code - PIC position independant code - linker, loader - Donald Knuth's MIX architecture and MIXAL assembly language - table, procedure, segmentation - far pointers
c - When a binary file runs, does it copy its entire binary data into memory at once? Could I change that? - Loading and execution of program in Linux -Stack Overflow
Understanding ld-linux.so.2
Program Loaders in Linux and Windows - loader vs ld vs ld.so - Global Offset Table -
Static and Dynamic Libraries - Nick Desaulniers
Object Files and Symbols - Nick Desaulniers
Shared Libraries: Windows vs Linux method - Stack Overflow
Airs – Ian Lance Taylor » Linkers part 1
linker - difference between dynamic loading and dynamic linking? - Stack Overflow
What is the difference between static and dynamic linking? - Quora
c++ - Static linking vs dynamic linking - Stack Overflow
linux - What is / does ld.so.preload do? - Super User
Linker and Libraries Guide
Internal and External Linkage in C++ – Peter Goldsborough
Analyzing the Linker Map file with a little help from the ELF and the DWARF - Govind Mukundan
The detail of compiling, linking, assembling and loading the C program image of process (binary/executable) into memory
The compiler, assembler, linker, loader and process address space tutorial - hacking the process of building programs using C language: notes and illustrations
What is compiler, linker, loader? - Stack Overflow
loader vs linker at DuckDuckGo
Difference Between Linker and Loader (with Comparison Chart) - Tech Differences
process - Memory Addresses: Linker Vs. Loader - Stack Overflow
Position-independent code - position-independent code (PIC) or position-independent executable (PIE)
linker - What is the -fPIE option for position-independent executables in gcc and ld? - Stack Overflow
PIC, PIE and Sanitizers · Mathieu Ropert
about ELF – PIE, PIC and else | Position-Independant Executable - Code - CodyWu's Blog
The real power of Linux executables – Execution process broken down - Own your bits
Libraries: Static or shared?
Static vs Dynamic libraries - Andrew Birnberg - Medium
c - GCC linking libc static and some other library dynamically, revisited? definitive explanation standard glibc handling
C++ Libraries: Linking and Compiling - slothparadise
GCC and Make - A Tutorial on how to compile, link and build C/C++ applications - -I, -L, -l arguments
What is the purpose of the '/etc/ld.so.cache' file on Linux Systems? - dynamic/runtime linker, linking process - ldconfig
rpath - GNU ld.so vs ld - dynamic/runtime linker
compiling - Where do executables look for shared objects at runtime? definitive - dynamic/runtime linkers - LD_LIBRARY_PATH, rpath, /etc/ld.so.conf - default linking directories
Definitive Shared Libraries Guide On Linux - LD_LIBRARY_PATH, LD_DEBUG
linux - Relationship between ldconfig and ld.so.cache - dpkg and apt triggers to rebuild the binary ld.so.cache - dynamic/runtime linker
Link time - Wikipedia

Dynamic program analysis - Wikipedia
Static program analysis - Wikipedia
www.kutub.info_4731.pdf
Reverse Engineering and Function Calling by Address - CodeProject
Difference between: Opcode, byte code, mnemonics, machine code and assembly - Stack Overflow
How to Reverse Engineer Software Easily? - Stack Overflow
HT Editor
.net - What is the difference between native code, machine code and assembly code? - Stack Overflow
Reverse Engineering Basics - YouTube
Reversing Tools
The Reversing Process : Reverse Engineering For Beginners - Develope IT
What is Reverse Engineering and Software Reverse Engineering? - Reverse Engineering for Beginners
Reversing Applications - Reverse Engineering For Beginners - Develope IT
Reversing in Software Development - Reverse engineering for beginners
Low-Level Software - Reverse Engineering for Beginners
Introduction to reverse engineering and Assembly. | KaKaRoTo's Blog
FinSpy VM Part 2: VM Analysis and Bytecode Disassembly — Möbius Strip Reverse Engineering
Reverse Engineering Training — Möbius Strip Reverse Engineering
Research — Möbius Strip Reverse Engineering
Best of Reverse Engineering - Hakin9 - IT Security Magazine
Understanding !PTE , Part 1: Let’s get physical – Ntdebugging Blog
how recursive function works at the assembly level at DuckDuckGo
understanding recursive calls on the stack at DuckDuckGo
assembly - How calls work in x86 - Reverse Engineering Stack Exchange
disassembly - How to extract functions from one executable to include/link in another - Reverse Engineering Stack Exchange

Cracking_Encryption_Obfuscation_Packing

How_To_Use_Radare2_And_Other_Tools

IDA_Pro

Binary Patching. The Brute Force of Reverse Engineering with IDA and Hopper (And a Hex Editor). « Null Byte :: WonderHowTo
Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 6 (Using IDA Pro) « Null Byte :: WonderHowTo
The Basics of IDA Pro
Applied Reverse Engineering with IDA Pro
IDA Pro Configuration Options
Reverse Engineering Necurs (Part 4 – IDA Pro’s Python API) – UT Austin Information Security Office
GitHub - nologic/idaref: IDA Pro Instruction Reference Plugin
GitHub - onethawt/idaplugins-list: A list of IDA Plugins
Hex-Rays Decompiler: Manual
What is the Best resource to learn IDA pro for beginners? - Quora
IDA Tutorials: General Purpose Tutorials
IDA Debugger: Overview
IDA Tutorials: Debugging Tutorials
IDA Tutorials: Remote Debugging
IDA Tutorials: Tracing
ida - How can I make EXE file of the modified copy? - Stack Overflow
patch - IDA Pro and editing executables - Stack Overflow
patch reversing - How do I change a string correctly in IDA Pro? PIC Position Independant Code related - Reverse Engineering Stack Exchange
debugging_windbg.pdf
IDA Debugger: Win32 To Win64
x64 - IDA cannot launch debugger for 64-bit exe files - Reverse Engineering Stack Exchange
debugging - DEbug x64 application using IDA PRO 6.1 - Stack Overflow
debugging - IDA PRO + Windows 10 + WinDbg - Reverse Engineering Stack Exchange
How can I make IDA see a string reference? - Reverse Engineering Stack Exchange

gdb

How can I make gdb save the command history? - Stack Overflow
gdb not giving the complete description of the error - Stack Overflow
Using GDB to Develop Exploits - A Basic Run Through
gdb history at DuckDuckGo
terminal - How to highlight and color gdb output during interactive debugging? - Stack Overflow
Linux Tutorial - GNU GDB Debugger Command Cheat Sheet - definitive
Gdbinit/gdbinit at master · gdbinit/Gdbinit · GitHub
Debugging with GDB
Beej's Quick Guide to GDB - definitive - intro - Breakpoints Stepping Around Examining Variables Misc Stuff Stack Manipulation Additional Stepping Methods Jumping to an Arbitrary Section of Code Changing Variables and Values at Runtime Hardware Watchpoints Attach to a Running Process Using Coredumps for Postmortem Analysis Window Functions Display Registers and Assembly Writing a Front-End Quick Reference Cheat Sheet
GDB Command Reference - Index page
PEDA - Python Exploit Development Assistance For GDB - KitPloit - PenTest Tools for your Security Arsenal ☣
lldb vs gdb at DuckDuckGo
Debugging with GDB - Tracepoints
How to handle stripped binaries with GDB? No source, no symbols and GDB only shows addresses? definitive GDB tutorial, insights and tricks - .gdbinit - Reverse Engineering Stack Exchange
GNU Debugger - gdb - remote debugging, embedded system, through serial device or TCP/IP communication - kgdb linux kernel debugging
Chapter 20. Debugging a Running Application - attaching - gdbserver - Red Hat Customer Portal
GDB – Debugging stripped binaries | Félix Abecassis
gdbserver - remote debugging - Wikipedia
Breakpoints, watchpoints, and catchpoints - GDB
A Quickstart Guide to Debugging C Programs with gdb
Debugging with GDB - Set Breakpoints
How to point GDB to your sources - definitive - list subcommand - debug sections in DWARF format
Hardware Breakpoint (or watchpoint) usage in Linux Kernel
Debugging Information in Separate Files - .debug file
Debugging with GDB: Separate Debug Files - .debug files
linux - How to terminate gdbserver? - Stack Overflow
BuildingCrossGDBandGDBserver - GDB Wiki
embedded linux - Need cross gdb for device - definitive
How to Debug Programs on Remote Server using GDBServer Example
Remote Cross-Platform Debugging with GDB - gdb server
Remote Debugging with GDB - gdbserver - definitive exhaustive doc
DEFINTIVE - Debugging with GDB - official doc - stack frames examination, sources
Cross Arch Remote Debugging with gdb and gdbserver
Cross Debugging with GDB: Embedded Linux - YouTube
Debugging with GDB - Specifying a Debugging Target - gdbserver
Debugging with GDB: Top

radare2

Radare2 Book
radare
radare2/doc at master · radare/radare2 · GitHub
Radare Basics - MOVEAX.ME
Radare2 - Radare2 - a framework for reverse engineering - radare2-workshop-slides.pdf
patch - Binary patching using radare2 in debug mode - Reverse Engineering Stack Exchange
Index of /2015/radare2-workshop
How to Reverse Engineering with Radare2 (A Quick Introduction) « Null Byte :: WonderHowTo
Reverse Engineering With Radare2, Part 1 | Sam Symons
Reverse engineering a Gameboy ROM with radare2 – Megabeets
A journey into Radare 2 – Part 1: Simple crackme – Megabeets
A journey into Radare 2 – Part 2: Exploitation – Megabeets
Reversing a Self-Modifying Binary with radare2 – Megabeets
Reverse Engineering Using Radare2 – Jacob Pimental – Medium
Reverse Engineering With Radare2 — Part 2 – Jacob Pimental – Medium
Debugging Using Radare2… and Windows! – Jacob Pimental – Medium
Defeating ioli with radare2
Introduction To Reverse Engineering With Radare2 - YouTube
pancake - Reversing with Radare2 - YouTube
(2) radare demystified (33c3) - YouTube
GitHub - dukebarman/awesome-radare2: A curated list of awesome projects, articles and the other materials powered by Radare2
reverse engineering - entry0 meaning in radare2 - Stack Overflow
How to display .text section of a PE in radare2? - Reverse Engineering Stack Exchange
Reverse Engineering With Radare - Fundamentals and Basics • tracing bytes
Reverse Engineering With Radare - Binary internals • tracing bytes
Radare2: An Introduction to Visual Mode - MOVEAX.ME
yet another radare2 cheatsheet.md · GitHub
radare2 r2-cheatsheet.pdf
radare2/intro.md at master · radare/radare2 · GitHub
Reverse Engineering With Radare2 – Intro – Insinuator.net
Getting started with Radare2 - cheat sheet
Tomas_Antecky-Disassembling_with_radare2.pdf
Radare2 documentation wiki - r2wiki
Radare2 defnitive tips and cheatsheet - r2wiki
radare2 cheat sheet - .rc config file - GitHub
Radare2 Cheatsheet – add/remove comment
Radare2 cheat Sheet - { Anas Aboureada }
Radare 2 in 0x1E minutes – Techorganic – Musings from the brainpan
Cheatsheet - r2wiki - definitive radare2 cheatsheet
r2con2017 - Hidden Gems in r2land by pancake - radare2
Remote GDB · Radare2 Book - gdbserver
How to debug with remote binaries radare2? - Reverse Engineering Stack Exchange
r2avtokyo-en.pdf
disassemble arm code radare2 - Recherche Google

Tools_Comparison

Comparison sheet Radare2 vs IDA Pro vs GDB vs WinDbg · Radare2 Book
Difference between nm and objdump - Stack Overflow
Unfair comparison between r2, IDA Pro and Hopper.
A (completely unfair) comparison between radare2, IDA Pro and Hopper : ReverseEngineering
immunitydbg vs ollydbg at DuckDuckGo
debuggers - What is the linux equivalent to OllyDbg and Ida Pro? - Reverse Engineering Stack Exchange
linux - Differences between objdump and xxd - Stack Overflow
linux - readelf vs. objdump: why are both needed - Stack Overflow
utilities - Can hd and od replace each other? - Unix & Linux Stack Exchange
tools - Is there any disassembler to rival IDA Pro? - Reverse Engineering Stack Exchange
Panopticon: A libre, cross platform disassembler for reverse engineering | Hacker News
Top 10 Essential CTF Tools for Solving Reversing Challenges - definitive list

Intro to Debugging x86-64 Assembly - Nick Desaulniers
How to view symbols in object files? - Stack Overflow
Pip3Line - The Swiss Army Knife Of Byte Manipulation - KitPloit - PenTest Tools for your Security Arsenal ☣
Reverse Engineering Tools
Avast launches open-source decompiler for machine code - TechSpot
Merry Xmas, fellow code nerds: Avast open-sources decompiler • The Register
bharadwaj.machiraju
RPISEC IOLI Challenges Solutions - Part 0x00 | Ring 0x00
Enigma Group - Solutions to IOLI crackmes - challenges | hvoid code
GitHub - lgeek/ioli_crackme_dbm_solution: Solving IOLI-crackme with Dynamic Binary Modification
MOVEAX.ME -
Reversing IOLI Crackme Challenges - Irken Kitties
ltrace - Wikipedia
Debugging Library (Linker and Libraries Guide)
od (Unix) - Wikipedia
Binary diffing - radiff2 · The Official Radare Blog
diff - How do I compare binary files in Linux? - Super User
masm - Microsoft Macro Assembler - Wikipedia
DarunGrim: A Patch Analysis and Binary Diffing Tool
ARM disassembly - Stack Overflow
linux - Using objdump for ARM architecture: Disassembling to ARM - Stack Overflow
binary ninja at DuckDuckGo
capstone reverse engineering at DuckDuckGo
ollydbg linux - Recherche Google
Netwide Assembler - nasm - Wikipedia
google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=4&ved=2ahUKEwit246QirvfAhUHgM4BHVC3DL0QFjADegQIBRAB&url=https%3A%2F%2Fwww.cs.swarthmore.edu%2F~newhall%2Funixhelp%2Fbinaryfiles.html&usg=AOvVaw0H5DQVcI9aFsaEdsTSAPYU
emacs - How can I compare two files similar to vim's vimdiff? - Stack Overflow
vimdiff - How do I use vim as a diff tool? - Vi and Vim Stack Exchange
disassembly - big-endian && little -endian? - objdump manual section about endiannes Stack Overflow
GitHub - ynh/cpp-to-assembly: C/C++ to assembly visualizer
Compiler Explorer - definitive online multi architecture assembler
linux - How to print only the hex values from hexdump without line numbers or ASCII table? hexdump - xxd -p - Stack Overflow
CTF-writeups/0x00.md at master · sure-fire/CTF-writeups · GitHub
IOLI crackme Writeup | Firmy’s blog
Showcases – Capstone – The Ultimate Disassembler - definitive list of disassemblers, debuggers - reverse engineering tools
Breakpoint - 1 Machine breakpoints 2 Non-interactive breakpoints 3 Interactive breakpoints 4 Breakpoint conditions 5 Inspection tools 6 Implementations 6.1 Hardware 6.2 Software
disassembler.io - definitive online tool

Bypassing_Software_Licensing_Systems

How to Crack Software - Method 2 (Intermodular Calls) - YouTube
The Hacks Behind Cracking, Part 1: How to Bypass Software Registration « Null Byte :: WonderHowTo
reset trial version lifetime at DuckDuckGo
How To Hack or Reset Trial Period of Any Software and Use Them Lifetime in PC
How to Reset the Trial Period of Software to work it Lifetime? ~ Digital Tips n Tricks
Using API Monitor to crack copy protected software | rohitab.com
Software Cracking Security Analysis - software_cracking.pdf

Building_Licensing_Systems

Implementing a Partial Serial Number Verification System in Delphi | Brandon Staggs .Com
Implementation of the Licensing System for a Software Product - CodeProject
A Ready To Use Software Licensing Solution in C# - CodeProject
How to Generate (and Validate) CD-Keys for your Software - CodeProject
License Key Generation - CodeProject
security - How are Software License Keys generated? - Stack Overflow

Encryption_Primitives_Identification_In_Binary_Code

tools - Determine Encryption Algorithm from binary code - Reverse Engineering Stack Exchange
GitHub - felixgr/kerckhoffs: Automatic Identification of Cryptographic Primitives in Software - cryptosystem/encryption algorithms identification in software - cryptanalysis
Phoenix Testing Facility: IDAscope update: Crypto Identification
FindCrypt – Hex Blog
FindCrypt2 – Hex Blog

Obfuscation-Packing-VM_Protections

Obfuscation (software) - Wikipedia
Security through obscurity - Wikipedia
RPISEC - Obfuscation - syllabus.pdf
Obfuscation : protection du code source contre le reverse engineering
La protection des programmes contre le reverse engineering
DEFCON 17: Binary Obfuscation from the Top-Down: Obfuscating Executables Without Writing Assembly - YouTube
Code Obfuscation Techniques for Software Protection - thesis-199.pdf
https://www.exploit-db.com/docs/english/12977-applied-binary-code-obfuscation.pdf
Defcon 18 - Trolling reverse engineers with math - frank - YouTube
[Advanced Programming Concepts] Obfuscation - YouTube
Reverse Engineering a JavaScript Obfuscated Dropper
How do I implement code obfuscation for native code? - Software Engineering Stack Exchange
Tutorial for Building and Reverse Engineering Simple Virtual Machine Protection
Using reverse engineering techniques to see how a common malware packer works
dream of a reverse engineer: Unpacking Custom Packers
Unpacking, Reversing, Patching
Explained: Packer, Crypter, and Protector - Malwarebytes Labs | Malwarebytes Labs
Deobfuscating xor’ed strings – Hex Blog
(2) Making a Simple Deobfuscator - YouTube
Encrypted Code Reverse Engineering: Bypassing Obfuscation
How to obfuscate string constants? - Stack Overflow
What are the advantages of obfuscating release code? - Software Engineering Stack Exchange
techniques for obscuring sensitive strings in C++ - Stack Overflow
How can I obfuscate a string into a C++ binary? - Stack Overflow
How to hide a string in binary code? - Stack Overflow
http://www.cs.ucsb.edu/~vigna/publications/2004_kruegel_robertson_valeur_vigna_USENIX04.pdf
Obfuscation Resilient Binary Code Reuse through Trace-oriented Programming
Hide Strings In Your Executable
Binary obfuscation - String obfuscating in C
Does a binary executable have to have some critical plain-text components? - Information Security Stack Exchange
Strings Obfuscation System - CodeProject
http://www.wisdom.weizmann.ac.il/~naor/PAPERS/tracing_traitors.pdf Encryption, tracing, watermarking.
Encrypted Code Reverse Engineering: Bypassing Obfuscation
The case for code obfuscation? - Software Engineering Stack Exchange
binary_obfuscation from the top down - defcon
How to hide a string in binary code? - Stack Overflow
https://repo.zenk-security.com/Reversing%20.%20cracking/Multi-stage%20Binary%20Code%20Obfuscation%20using%20Improved%20Virtual%20Machine.pdf
dotfuscator c++ - Google Search
Source code obfuscation
GitHub - 0xd4d/de4dot: .NET deobfuscator and unpacker.

Malware_Analysis

Deep Dive into a Custom Malware Packer
The road to Reverse Engineering Malware – Pablo Ramos – Medium
Unpacking a malware with libPeConv (Pykspa case study) | hasherezade's 1001 nights
GitHub - RPISEC/Malware: Course materials for Malware Analysis by RPISEC
GitHub - rshipp/awesome-malware-analysis: A curated list of awesome malware analysis tools and resources.
Red Alert v2.0: Misadventures in Reversing Android Bot Malware
Reverse Engineering Necurs (Part 3 – Patching) – UT Austin Information Security Office
Reverse Engineering – Malware Analysis - UT Austin Information Security Office
Decrypting APT33's Dropshot Malware with Radare2 and Cutter – Part 1 – Megabeets
https://www.virustotal.com/#/home/upload
http://security.cs.rpi.edu/courses/malware-spring2013/
Analyzing malicious documents (W32) - eForensics
Code segment encryption - Code Armoring - Malware Analysis - Sevagas

Movies-Video_Games_Cracking

hack console game turn it into pc game - Google Search
Hack For Security: Google Dork For Finding E books
How to Nab Free eBooks Using Google « Null Byte :: WonderHowTo
Motherboard Hacking Livestream: Cracking MMORPGs - Motherboard
hack console game turn it into pc game - Google Search
vmprotect vs denuvo - Google Search
convert console games iso into pc games at DuckDuckGo
6 Answers - Can I convert a console physical copy of a game (PS4) into a PC copy?
Turning a PS2 game into a bootable .EXE file and other weekly news. | Unpause And Pwn
Can you convert ps2 games to PC game
How To Convert Any Computer Into A Gaming Console With Lakka Linux Distro
Hack Like a Pro: How to Anonymously Torrent Files with Tribler « Null Byte :: WonderHowTo
How does YiFY get all these Bluray movies early? : torrents
How Do Movies Leak Before They Come Out on DVD and Blu-Ray?
why is it not possible to crack hd movie before the release at DuckDuckGo
Inmates pirated movies from computers they build with spare parts
security The Teens Who Hacked Microsoft's Xbox Empire—And Went Too Far Author: Brendan KoernerBrendan Koerner
how to hack movies hd before dvd release - Google Search
Assassin’s Creed Origins “VMProtect + Denuvo” protection has been cracked | DSOGaming | The Dark Side Of Gaming
decompilation - How do Enigma, Themida and VMProtect compare to each other? - Reverse Engineering Stack Exchange
vmprotect reverse engineering at DuckDuckGo

Software cracking - Wikipedia
Crackme - Wikipedia
Hotpatching a C Function on x86 « null program
Binary Analysis Course – Max Kersten
Technical Risks of Reverse Engineering and Unauthorized Code Modification - OWASP
RH10 Moon.pdf
Reversing Cracking - Hakin9 - IT Security Magazine
CrackFAQ
Difference between Data Masking and Data Obfuscation | Data Masking vs Data Obfuscation
how-to-crack.pdf
Index of file:///home/programmersn/Downloads/Cybersecurity-20170815T072300Z-001/Cybersecurity/Reverse_Engineering/howtocrack/
Rp++ - Tool That Aims To Find ROP Sequences In PE/Elf/Mach-O X86/X64 Binaries - KitPloit - PenTest Tools for your Security Arsenal ☣

Cracking_Mobile_Apps

Cracking_Java-Android_Apps

Debugging_Environment-Tools

Attacking Android Applications With Debuggers - definitive guide
Android Reverse Engineering: Debugging Smali in Smalidea in Android studio| definitive guide - ddms monitor launch - Alexander Molochko
AndroidSDK - adb debugging on linux - Community Help Wiki
Run apps on a hardware device  - adb debugging |  Android Developers
Android Debug Bridge (adb)  | official guide - adb commands reference -  Android Developers
Setting up your System to Detect your Android Device with adb
Setting up an android Device for Development - adb - android devices vendors id - vendorID
Apktool - Documentation
Smalidea plugin in Android Studio - Stack Overflow
smalidea · JesusFreke/smali Wiki - android application apk disassembling and debugging - definitive guide
Java decompiler online

Dalvik_Bytecode-Smali_Syntax

Registers · JesusFreke/smali Wiki
smali/HelloWorld.smali at master · JesusFreke/smali
TypesMethodsAndFields · JesusFreke/smali Wiki
Dalvik opcodes
android cracking: example.smali
android cracking: example-structures.smali

Native_Android-ARM_Reversing

Native Android Reverse Engineering Tutorial#1: Patching/Modifying String within Native Android App ~ Shubham Aher | Blog
disassembly - How do I reverse engineer .so files found in android APKs? - Reverse Engineering Stack Exchange

Reverse Engineering Android:Disassembly & Code Injection - static evasion heuristic, smali syntax
Studying APK reverse engineering by breaking the anonymity of BlindSpot app
Security tips  |  Android Developers
How Android Apps are Built and Run · dogriffiths/HeadFirstAndroid Wiki
Practice of Android Reverse Engineering
Android Deobfuscation Tools and Techniques
android cracking: way of the android cracker
android cracking: way of the android cracker 1
Various Methods to Disassemble DEX Files - ForensicsWiki
android - What does OAT mean? - Stack Overflow
android - Difference between dexopt and dex2oat? - Stack Overflow
Android Hacking and Security, Part 1: Exploiting and Securing Application Components
Android for Pentesters: Application Reversing - YouTube
java - Decompile an APK, modify it and then recompile it - Stack Overflow
Projects/OWASP Androick Project - OWASP
GitHub - amoulu/TinySmaliEmulator: A very minimalist smali emulator that could be used to "decrypt" obfuscated strings
reverse engineering apk jni so - Recherche Google
java - Android NDK possibility of decompiling native code - Stack Overflow
GitHub - lxdvs/apk2gold: CLI tool for decompiling Android apps to Java. It does resources! It does Java! Its real easy!
Obfuscating Android Applications using O-LLVM and the NDK
Reverse Engineering Pre-Installed Android Apps

Cracking_iOS-OSX_Apps

GitHub - iosre/iOSAppReverseEngineering: The world’s 1st book of very detailed iOS App reverse engineering skills :)
A Quick Guide to Using Clutch 2.0 to Decrypt iOS Apps | Digital Forensics Tips
Reverse Engineering Tools - iPhone Development Wiki
ios - Library? Static? Dynamic? Or Framework? Project inside another project - Stack Overflow
Become an iOS Hacker - How to Write Your First Exploit using Return Oriented Programming (ARM) - YouTube
hacking-ios-on-the-run-using-cycript.pdf
iOS apps reverse engineering - iOS_apps_reverse_engineering-SCS3_2011_Bachmann.pdf
Microsoft Word - iOSAppReverseEngineering.docx - iOSAppReverseEngineering.pdf
iOS_App_Hacking-AppSecUSA_2014.pdf
IOS Application Security Testing Cheat Sheet - OWASP
iOS_Security_iOS_10_Mar2017
gdbinit (fG!) · GitHub
Reverse Engineering Mac OS X

Preventing_Reverse_Engineering_of_Mobile_Apps

Mobile app reversing and tampering | CSO Online
OWASP/owasp-mstg: The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security testing and reverse engineering.
Bytecode obfuscation - proguard - OWASP
owasp-mstg/0x05j-Testing-Resiliency-Against-Reverse-Engineering.md at master · OWASP/owasp-mstg
An Android Application Protection Scheme against DynamicReverse Engineering Attacks
Communication and Communicating Devices: Code Protection in Android
Les développeurs Android peuvent désormais empêcher leur application de prendre un appareil rooté en charge, par le biais de l'API SafetyNet

Projects/OWASP Mobile Security Project -2015 Scratchpad - OWASP
Supercar Showdown - Supercar Showdown
‘Hello World!’ in ARM assembly
Reverse-Engineering/CydiaSubstrate at master · rootkiter/Reverse-Engineering · GitHub

Cracking_Hardware-Embedded-IoT

How I Reverse Engineered and Exploited a Smart Massager
Reverse Engineering A BLE Service To Control A Light Bulb | Hackaday
Reverse engineering the Intel FSP… a primer guide! – Purism
Unbox Your Phone — Part I. – taszksec – Medium
Dummies Guide to Reverse Engineering | Hackaday
CSCI 4974 / 6974 RPISEC Hardware Reverse Engineering
Smart card security - from a programming languageand static analysis perspective - Leroy - pdf
Hardware Hacking: Extracting Firmware from Atmel Microcontrollers
[IoT Security] Introduction to Embedded Hardware Hacking - definitive tools list - Bus Pirate, which gives you the ability to connect to the UART, I2C, SPI, and JTAG communication protocols - vs Shikra vs Seggar J-link - BeagleBone Black board

Firmwares-Binary_Blobs_Reversing

Binwalk | Penetration Testing Tools - firmware analysis tool
unpacking Download.img firmware for alcatel mw40 - Reverse Engineering Stack Exchange
Embedded Devices Security - Firmware Reverse Engineering
How do I extract a copy of an unknown firmware from a hardware device? JTAG, UART, UrJTAG, OpenOCD, U-Boot, ICSP - Snarfing - ROM reader/programmer - definitive exhaustive answer - hacking tools
Firmware analysis and file system extraction? - Reverse Engineering Stack Exchange
Extract files from a bin firmware - binwalk - Reverse Engineering Stack Exchange
Unable to extract IP camera firmware - binwalk -. firmware analysis, examination of an entropy plot - Reverse Engineering Stack Exchange
DEFINITIVE - Introduction to Firmware Reversing - D-Link Camera
Firmware security, why it matters and how you can have it - YouTube
DEFINITIVE - Introduction to Firmware Reversing - D-Link Camera - associated to youtube video
DEFINITIVE - Reverse engineering embedded software using Radare2 - MIPS Architecture
Simple Firmware Reverse Engineering - dd command options
Firmware Reverse Engineering - lzma, flashrom
Extracting Firmware from External Memory via JTAG - YouTube
DEFINITIVE - firmware hacking - Binwalk alternative - Reverse Engineering Stack Exchange
Demystifying Firmware Debugging - Gears of Resistance
Reversing and Exploiting Embedded Devices: The Software Stack (Part 1)
GitHub - airbus-seclab/cpu_rec: Recognize cpu instructions in an arbitrary binary file - binwalk module
Emulating Embedded Linux Devices with QEMU | Novetta
radare2 – Firmware Security
Firmware Security – Hastily-written news/info on the firmware security - resources
IoT Penetration Testing Part 1 - Twelvesec
Poking around router firmware using Binwalk - YouTube
Binwalk Utility Helps You Analyze and Reverse-Engineer Firmware Files
exploiting firmware binarys using a bufferoverflow - a practical tutorial — Steemit

Hacking Embedded Devices - hardware security
Reverse-engineering Broadcom wireless chipsets - hardware wifi hacking - WLAN
Intro to Embedded Reverse Engineering for PC reversers

Hardware_Drivers_Reversing

Reverse-Engineering Drivers for Safety and Portability
I hate software: On GPU ISAs and hacking - reverse engineering, linux kernel drivers
windows - Reverse engineering USB peripheral driver - Reverse Engineering Stack Exchange
Reverse engineering vendor firmware drivers for little fun and no profit [linux.conf.au 2014] - YouTube
How Device Drivers Are Reverse Engineered - Slashdot
Reverse Engineering A USB HID RFID Reader Writer · charlysan/pyrfidhid Wiki · GitHub
USB Reverse Engineering: Down the rabbit hole | /dev/alias – Hack. Dev. Transcend.
Ever wondered how device drivers are reverse engineered? | Hacker News
USB Reverse Engineering: A Universal Guide | Hackaday
Reverse Engineering of Binary Device Drivers with RevNIC
Reverse Engineering & Bug Hunting on KMDF Drivers - Reverse_Engineering_and_Bug_Hunting_On_KMDF_Drivers.pdf
Reverse Engineering USB Protocol · openrazer/openrazer Wiki · GitHub
An IDA Pro Plugin For Windows Driver Reversing
USB Reverse Engineering: Down the rabbit hole - By Glenn 'devalias' Grant
Reverse Engineering: Writing a Linux driver for an unknown device - windows to linux kernel module portage - open(), close(), read(), ioctl(), mmap()
Reverse Engineering PCI Drivers - coreboot
Reverse engineering the Elan KTF2K touchscreen driver - Paul Kocialkowski's coding blog

Practical Partial Hardware Reverse Engineering Analysis | SpringerLink
(PDF) Reverse Engineering–Hardware and Software
Hardware Reverse Engineering:Overview and Open Challenges
Hardware Reverse Engineering 101 [1/3] - Layerone 2013 - YouTube
Hrdaware and Firmware reverse engineering - UART, backdoors, vulnerability, IoT, embedded
Electronics Reverse Engineering Walkthrough - Hacking the Monoprice Select Mini 3D Printer - IoT, embedded
DEFINITIVE - Reverse Engineering Embedded ARM Devices - by pancake, radare2 author
Tutorial: Introduction to Reverse Engineering - Mike Anderson, The PTR Group, Inc. - Hardware, IoT, embedded, electronics
BalCCon2k16 - Travis Goodspeed - Nifty Tricks for ARM Firmware Reverse Engineering - YouTube
learning to reverse engineer routers - reading serial flash ROMs - read only memory
Intro to Hardware Reversing: Finding a UART and getting a shell - YouTube
Reverse Engineering Embedded Software - an introduction Using Radare2
Minded Security Blog: Pentesting IoT devices (Part 1: Static Analysis)
Emulating and Exploiting Firmware binaries - Offensive IoT Exploitation series
Modern Vulnerability Research Techniques on Embedded Systems - Breaking Bits
Nikita Abdullin - Reverse-engineering of embedded MIPS devices. Case …
Do not create a backdoor, use your provider’s one !
HACKABLE SECURITY MODULES - REVERSING AND EXPLOITING A FIPS140-2 LVL 3 - HSM - FIRMWARE
Mind Booster Noori: How to extract a dts from an Android Phone - device tree source - boot.img -
Working with proprietary blobs | LineageOS Wiki - Android

Reverse engineering - Wikipedia
A Reverse Engineering Reading List | Sam Symons
Reverse Engineering
fdivrp/awesome-reversing: A curated list of awesome reversing resources - reverse engineering
RPISEC · GitHub
DEFINITIVE - Reverse Engineering Resources-Beginners to intermediate Guide/Links - definitve resources list - hypervisor based debugger - Anti-Reverse Engineering Techniques & Countermeasures - firmwares - packers, process hooking -
DEF CON 23 - Chris Domas - Repsych: Psychological Warfare in Reverse Engineering - YouTube

Social_Engineering

Phishing

Business_Email_Compromise_Attacks

What is a Business Email Compromise (BEC) Attack? And How Can I Stop It?
How Business Email Compromise Attacks Work: A Detailed Case Study

Phishing Definition, Prevention, and Examples
How to Avoid Phishing Scams
6 Anti-Phishing Tips Backed by Security Experts
Giant spambot scooped up 711 million email addresses - BBC News
Phishing Schemes Are Using HTTPS Encrypted Sites to Seem Legit | WIRED
spoofing vs phising at DuckDuckGo
How to Avoid Phishing on LinkedIn
According to TRENDMICRO Business Email Compromise (BEC) attacks could reach $ 9 billion in 2018Security Affairs
Fourth Fappening Hacker Admits to Stealing Celebrity Pics From iCloud Accounts
Phishing for “Access” – rvrsh3ll’s Blog
GitHub - UndeadSec/SocialFish: Ultimate phishing tool with Ngrok integrated.
Ultimate Phishing Tool with Ngrok Integrated: SocialFish

Social engineering (security) - Wikipedia
Social Engineering « Null Byte :: WonderHowTo
Hack Like a Pro: The Ultimate Social Engineering Hack « Null Byte :: WonderHowTo
Social Engineering Examples and techniques in Ethical Hacking
Common Social Engineering Attack Tactics and How to Prevent Them
phishing vs social engineering at DuckDuckGo
How Hackers Steal Passwords using the SEToolkit
Scammers bought Twitter ads to run verified badge phishing scam
build wikipedia reputation for hacking - Google Search
What is reverse social engineering? - Information Security Stack Exchange
Social Engineering: How to Use Persuasion to Compromise a Human Target « Null Byte :: WonderHowTo
Social Engineering - Total Guide « Null Byte :: WonderHowTo

OS-wise_attacks

Amazon_FreeRTOS_IoT_Hacking

Critical Flaws Found in Amazon FreeRTOS IoT Operating System

Windows_attacks

What do you think of the current Windows OS ? - Quora
is windows 10 less vulnerable at DuckDuckGo
WinSpy - A Windows Reverse Shell Backdoor Creator With An Automatic IP Poisener - KitPloit - PenTest Tools for your Security Arsenal ☣
Securing your Endpoint and Identity with Windows 10 (W40) - Pentestmag
Hacker Discloses New Windows Zero-Day Exploit On Twitter
Unpatched Windows Flaw Lets Attackers Backdoor Systems (Updated)
PowerShell for Hackers - Hakin9 - IT Security Magazine
Researcher Discloses New Zero-Day Affecting All Versions of Windows
Active Spy Campaign Exploits Unpatched Windows Zero-Day | The first stop for security news | Threatpost
PowerShell for Hackers (W41) - Hakin9 - IT Security Magazine
Firework - Leveraging Microsoft Workspaces in a Penetration Test - KitPloit - PenTest Tools for your Security Arsenal ☣
Exploit Development on Windows (W38) - Pentestmag
Recent Windows ALPC zero-day has been exploited in the wild for almost a week | ZDNet
Windows utility used by malware in new information theft campaigns | ZDNet
Hacker Discloses Unpatched Windows Zero-Day Vulnerability (With PoC)

Patches_Releases

Awesome Windows Exploitation Resources
Windows Exploitation - RPISEC - Smashing Stacks, For Fun & Credit
Windows Registry and Log Analysis (W31) - eForensics
Null Character Bug Lets Malware Bypass Windows 10 Anti-Malware Scan Interface
Exploiting Format Strings in Windows | 🔐Blog of Osanda
Userland API Monitoring and Code Injection Detection - Malware - 0x00sec - The Home of the Hacker
Decrement Windows kernel for fun and profit | Wolf's IT-thoughts
How Not to Encrypt a File — Courtesy of Microsoft – Robert Parks – Medium
Creeping on Users with WMI Events: Introducing PowerLurk | Pentest Armoury
How to Hack Windows 7 (Become Admin) « Null Byte :: WonderHowTo
Hack Like a Pro: How to Exploit Adobe Flash with a Corrupted Movie File to Hack Windows 7 « Null Byte :: WonderHowTo
Hack Like a Pro: How to Find the Latest Exploits and Vulnerabilities—Directly from Microsoft « Null Byte :: WonderHowTo
How to Extract Windows Usernames, Passwords, Wi-Fi Keys & Other User Credentials with LaZagne « Null Byte :: WonderHowTo
Hack Like a Pro: How to Exploit and Gain Remote Access to PCs Running Windows XP « Null Byte :: WonderHowTo
Key Windows 10 Anti-Malware Tech Critically Broken - ExtremeTech
Patch Tuesday: Microsoft Releases Update to Fix 53 Vulnerabilities
Microsoft' New Feature to Protect Windows 10 from Ransomware
Your Windows Login Details Can Be Stolen By Hackers Without User Interaction
It's 2017... And Windows PCs can be pwned via DNS, webpages, Office docs, fonts – and some TPM keys are fscked too • The Register
Microsoft Patches Critical Windows DNS Client Vulnerabilities | Threatpost | The first stop for security news
Unpatched Windows Kernel Bug Could Help Malware Hinder Detection
Linux Subsystem on Windows 10 Allows Malware to Become Fully Undetectable
CowerSnail — Windows Backdoor from the Creators of SambaCry Linux Malware
How to Hack Windows: Beginner Level Part -6 - Develope IT
Microsoft Issues Security Patches for 25 Critical Vulnerabilities
Malware display fake BSOD to sell phony Windows anti-virus for $25
Microsoft Issues Emergency Windows Security Update For A Critical Vulnerability
Microsoft Issues Patches for Another Four Zero-Day Vulnerabilities
You Can Steal Windows Login Credentials via Google Chrome and SCF Files
Pre-Installed Password Manager On Windows 10 Lets Hackers Steal All Your Passwords
For 8 days Windows bundled a password manager with a critical plugin flaw | Ars Technica
thehackernews.com/2018/01/microsoft-security-patch.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+TheHackersNews+(The+Hackers+News+-+Security+Blog)&m=1
Trois exploits de la NSA réécrits pour affecter toutes les versions de Windows lancées à partir de l'an 2000
Hacking Windows 10: How to Break into Somebody's Computer Without a Password (Setting Up the Payload) « Null Byte :: WonderHowTo
Sonic & Ultra signals can be used to crash Windows, Linux & hard drives
Extracting SSH Private Keys from Windows 10 ssh-agent
Critical Windows bug fixed today is actively being exploited to hack users – Ars Technica
why is microsoft considered more vulnerable than other oses - Google Search
Securing Your Endpoint and Identity in Windows 10 - PenTestMag course
Warning: Your Windows PC Can Get Hacked by Just Visiting a Site
malware gen win32 at DuckDuckGo
Hackers Publish PoC of Zero-day Vulnerability in Windows on Twitter

Mac_OS_X_hacking

The UK war-games cyberattacks that could black out Moscow — Quartz
Apple Kernel Code Vulnerability Affected All Devices | Hackaday
Le FBI a résolu un mystère vieux de 15 ans entourant le malware Fruitfly Mac qui était utilisé pour espionner les victimes via leur webcam ou micro
ex-NSA Hacker Discloses macOS Mojave 10.14 Zero-Day Vulnerability
How to Hack Mac OS X Lion Passwords « Null Byte :: WonderHowTo
Fake Symantec Blog Caught Spreading Proton macOS Malware
Apple Users, Beware! A Nearly-Undetectable Malware Targeting Mac Computers
Stupid, stupid MacOS security flaw grants admin access to anyone | ZDNet
Juuso Salonen — Breaking into the OS X keychain
Millions of Up-to-Date Apple Macs Remain Vulnerable to EFI Firmware Hacks
Password-theft 0-day imperils users of High Sierra and earlier macOS versions | Ars Technica
Apple MacOS High Sierra Security Flaw Lets Anyone Get Root Access, No Password Required | WIRED
macOS High Sierra Bug Lets Anyone Gain Root Access Without a Password
Is Apple getting sloppy? - BBC News
Apple's MacOS High Sierra Update Reintroduces "Root" Bug For Some Users | WIRED
New MacOS Malware, Signed With Legit Apple ID, Found Spying On HTTPS Traffic
New OSX.Pirrit Malware floods Mac devices with ads; spies on users
Apple Security Flaws Give Some Researchers Concern About Deeper Issues | WIRED
Windows Kernel Exploitation Tutorial Part 1: Setting up the Environment - rootkit
Warning: New Undetectable DNS Hijacking Malware Targeting Apple macOS Users
Apple inaugure le Nouvel An avec l'annonce d'une faille de sécurité dans macOS, la quasi-totalité des moutures de l'OS seraient affectées
New macOS malware hijacks DNS settings and takes screenshots
Mac Privacy: Sandboxed Mac apps can record your screen at any time without you knowing · Felix Krause

GNU-Linux_Security

Hardening_Linux_Defense

Locking Down Linux: Using Ubuntu as Your Primary OS, Part 1 (Physical Attack Defense) « Null Byte :: WonderHowTo
Top 20 OpenSSH Server Best Security Practices - nixCraft
Linux: 25 Iptables Netfilter Firewall Examples For New SysAdmins - nixCraft
40 Linux Server Hardening Security Tips [2017 edition] - nixCraft
Security-Enhanced Linux - Wikipedia
A sysadmin's guide to SELinux | Opensource.com
sudo - From a security standpoint should I add my user to the sudoers file or not? - Unix & Linux Stack Exchange
Best practices for hardening sudo? - Information Security Stack Exchange
25 Hardening Security Tips for Linux Servers
10 Useful Open Source Security Firewalls for Linux Systems
Unix security - Wikipedia
Auto-login as Root - privileges, permissions model - privilege escalation - gtksu
Fear Not Root - privileges - definitive breakdown
Grafpup News Page » Multi user support in Puppy and Grafpup Linux - my thoughts - root, privileges, ActiveX - xterm, rxvt
Privileges segregation in Puppy Linux - security model - root, spot and fido users - squashfs
When does the Puppy linux security model make sense? - Unix & Linux Stack Exchange

Google Hacker Discloses New Linux Kernel Vulnerability and PoC Exploit
New Privilege Escalation Flaw Affects Most Linux Distributions
Linux Soft Exploit Suggester - Search Exploitable Software On Linux - KitPloit - PenTest Tools for your Security Arsenal ☣
x86_64 reverse TCP bind shell with basic authentication on Linux systems – Pentester's life
why linux doesn't need antivirus - Google Search
"Bad Taste" Vulnerability Affects Linux Systems via Malicious Windows MSI Files
Linux antivirus and anti malware: 8 top tools | CSO Online
Critical Code Injection Flaw In Gnome File Manager Leaves Linux Users Open to Hacking
New Linux Malware Exploits SambaCry Flaw to Silently Backdoor NAS Devices
opensource.com/business/16/6/managing-passwords-security-linux?sc_cid=70160000001273HAAQ
Why does APT not use HTTPS?
OpenWall unveils kernel protection project • The Register
LKRG - Linux Kernel Runtime Guard
Hard-Coded Password in Cisco Software Lets Attackers Take Over Linux Servers
Controverse autour de Linux 4.17 : la dernière mouture du kernel supporte Speck, un algorithme de chiffrement rejeté par l'ISO
hacking - ubuntu sudoers file hacked? - Server Fault
Ethical Hacking: sudo less exploit
How to exploit SUDO via Linux Privilege Escalation
Dangerous Sudoers Entries – PART 1: Command Execution – NOEXEC tag - Compass Security Blog
sudoer file security - Recherche Google
How to extract and disassemble a Linux kernel image (vmlinuz) - objdump, /boot/System.map, extract-vmlinuz - reverse engineering
security - Why there is no https transport for debian apt tool? - Unix & Linux Stack Exchange

D-Bus_Security

Improving the security of D-Bus - vulnerbailities

FreeBSD_Exploitation

Comparison of privilege authorization features - Wikipedia
Why-doesnt-Linux-need-a-firewall-by-default-like-Windows-does

Web_Security

Platforms_Hacking

Google

Youtube

The 'Despacito' YouTube Hack Was Probably Pretty Simple to Pull Off | WIRED

Google study reveals how criminals break into Gmail accounts – Naked Security
Google's 'Advanced Protection' Locks Down Accounts Like Never Before | WIRED
hack google check device activity - Google Search
Android Will Alert You When A New Device Logs-in Your Google Account
Enable Google's New "Advanced Protection" If You Don't Want to Get Hacked
Google study shows how your account is most likely to be hijacked
Advanced Social Engineering, Part 2: Hack Google Accounts with a Google Translator Exploit « Null Byte :: WonderHowTo
Google Advanced Protection: The Most Secure Account of All | WIRED
How to Secure Your Google Account with Yubikey
Always Carry Your Google Account's Two-Step Verification Codes With You
Chrome's WebUSB Feature Leaves Some Yubikeys Vulnerable to Attack | WIRED

Facebook

what about ddosing facebook - Google Search
4 Ways to Crack a Facebook Password & How to Protect Yourself from Them « Null Byte :: WonderHowTo
Hack Like a Pro: How to Hack Facebook, Part 1 (Same-Origin Policy) « Null Byte :: WonderHowTo
Social Engineering, Part 2: Hacking a Friend's Facebook Password « Null Byte :: WonderHowTo
Facebook Hacks « Null Byte :: WonderHowTo
Hack Like a Pro: How to Get Facebook Credentials Without Hacking Facebook « Null Byte :: WonderHowTo
Hack Like a Pro: How to Hack Facebook, Part 2 (Facebook Password Extractor) « Null Byte :: WonderHowTo
what about ddosing facebook - Google Search
Wait, Do You Really Think That’s A YouTube URL? Spoofing Links On Facebook
Scam Alert: Your Trusted Friends Can Hack Your Facebook Account
How to Hack Facebook Password Using Brute Force Attack - Develope IT
Here's How To Hack Facebook Account Using Your Old Phone Number
10 Ways Hackers Hack Your Facebook Account and How to Prevent it
Another Facebook Bug Allowed Anyone to Delete Your Photos
How To Find Out If Your Facebook Account Has Been Hacked
Researcher reports how to hack Facebook account with Oculus Integration
Facebook's Mandatory Anti-Malware Scan Is Invasive and Lacks Transparency | WIRED
facebook vulnerability | leaking the list of admins for any page - YouTube
A Simple Bug Revealed Admins of Facebook Pages — Find Out How
facebook-two-factor-authentication

Twitter

Twitter notifies users about API bug that shared DMs with wrong devs | ZDNet
How To Check If Your Twitter Account Has Been Hacked
Making an XSS triggered by CSP bypass on Twitter. – tbmnull – Medium

LinkedIn

how to create a perfect linkedin fake account - Google Search
how to create a perfect linkedin fake account - Google Search

Instagram

Hack Instagram Account Using BruteForce « Null Byte :: WonderHowTo
Instagram-Py - Simple Instagram Brute Force Script - KitPloit - PenTest Tools for your Security Arsenal ☣

Oracle

Oracle rushes out 5 patches for huge vulnerabilities in PeopleSoft app server – Ars Technica
Highly Critical Flaw (CVSS Score 10) Lets Hackers Hijack Oracle Identity Manager

Uber

how to hack into Uber Rider account - Google Search
how to hack into Uber Rider account - Google Search

Tumblr

How i hacked 23.900.000 tumblr domains at once :) – Ak1T4 – Medium

Atlassian

Atlassian's HipChat Hacked — Users' Data May Have Been Compromised

Tinder

Tinder's Lack of Encryption Lets Strangers Spy on Your Swipes | WIRED

Dreambox

ManageEngine

3 of 5 Fortune 500 companies vulnerable due to ManageEngine flaws

Amazon

Hacking Amazon Key - Hacker shows how to access a locked door after the delivery - Security AffairsSecurity Affairs
After dismissing security flaw, Amazon patches Key smart lock anyway | ZDNet

Git-based_platforms

GitHub - zricethezav/gitleaks: Searches full repo history for secrets and keys 🔑

Cloudflare

GitHub - pirate/sites-using-cloudflare: Archived list of domains using Cloudflare DNS at the time of the CloudBleed announcement.
CloudFlare Watch
How does CrimeFlare know a CloudFlare website’s true IP address? - Quora
exploit cloudflare at DuckDuckGo
How to bypass cloudflare & attack website - YouTube
Bypass Cloudflare To Get Real IP Address of a Website (Using 3 Methods) - YouTube
Use SQLMAP To Bypass Cloudflare WAF And Hack Website With SQL Injection - Sunny Hoi
CloudFlair: Bypassing Cloudflare using Internet-wide scan data - Christophe Tafani-Dereeper
GitHub - christophetd/CloudFlair: 🔎 Find origin servers of websites behind by CloudFlare using Internet-wide scan data from Censys.
GitHub - m0rtem/CloudFail: Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network
GitHub - HatBashBR/HatCloud: Bypass CloudFlare with Ruby
Cloudflare: Evading Cloud Security Protections | Rhino Security Labs
Samiux's Blog: [RESEARCH] Cloudflare Can Be Bypassed
KitPloit - PenTest Tools for your Security Arsenal ☣: Search results for cloudflare
Search results for 'cloudflare' - 0x00sec - The Home of the Hacker
Incident report on memory leak caused by Cloudflare parser bug

0-Day Flaws in Vanilla Forums Let Remote Attackers Hack Websites

Web_Browser_Security

Stop Using Microsoft Edge To Download Chrome -- Unless You Want Malware
Beware! Unpatched Safari Browser Hack Lets Attackers Spoof URLs
Meet the malware which hijacks your browser and redirects you to fake pages | ZDNet

Browser_Pentesting_Addons

18 Extensions For Turning Firefox Into a Penetration Testing Tool
19 Extensions to Turn Google Chrome into Penetration Testing tool

Addons_Hacking

Addon_Code_Review

malware - Are official browser add-ons really safe? - Information Security Stack Exchange
Getting the source code of your favourite Firefox’s extension | GeekyCoder
Source code of Firefox Add-ons - Information Security Stack Exchange
Extract Firefox Addon Source Code: 4 Steps
How to View or Edit the Source Code of a Firefox Addon | TechGainer

MEGA Chrome extension hacked with cryptocurrency malware
Browser Extensions: Are They Worth the Risk? — Krebs on Security

Flash_Player_Attacks

Attackers Exploiting Unpatched Flaw in Flash — Krebs on Security
(Unpatched) Adobe Flash Player Zero-Day Exploit Spotted in the Wild
Adobe Patches Two Critical RCE Vulnerabilities in Flash Player
Why Adobe Flash is a Security Risk and Why Media Companies Still Use it
How secure is Flash? Here's what Adobe won't tell you | ZDNet
Flash. Must. Die. | WIRED
Adobe Issues Patch for Actively Exploited Flash Player Zero-Day Exploit

Chrome 63 offers even more protection from malicious sites, using even more memory | Ars Technica
A sneaky extension for Chrome, Firefox prevents its removal, hijacks browser
5 Popular Firefox Extensions You Should Remove Right Now

user agent url - Google Search
referrer url - Google Search
Hack Like a Pro: How to Exploit IE8 to Get Root Access When People Visit Your Website « Null Byte :: WonderHowTo
this page is trying to load scripts from unauthenticated sources - Google Search
Many Chrome browser extensions do sneaky things | InfoWorld
Hacking Pranks: How to Flip Photos, Change Images & Inject Messages into Friends' Browsers on Your Wi-Fi Network « Null Byte :: WonderHowTo
user agent url - Google Search
referrer url - Google Search
8 More Chrome Extensions Hijacked to Target 4.8 Million Users
Hackers Hijacked Chrome Extension for Web Developers With Over 1 Million Users
WebDavC2 - A WebDAV C2 Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
Critical RCE Vulnerability Found in Cisco WebEx Extensions, Again — Patch Now!
Beware! Hackers Can Steal Your Windows Password Remotely Using Chrome
BlockIt - Chrome extension to block requests - CodeProject
Malicious Chrome Extension Steals 'All Posted Data' without Login Credentials
Google plans to stop trusting current Symantec certificates: Here's what tech pros need to know - TechRepublic
Browser Autofill Is a Privacy Risk: Here's How to Turn It Off
Top 15 Best Secure Android Browsers To Browse Web Securely

Client_Side_Scripts_Risks

Web-Servers_Security

NginX_Security

Top 25 Nginx Web Server Best Security Practices - nixCraft
ssl - How to redirect on the same port from http to https with nginx reverse proxy - Stack Overflow
NGINX tutorial | Learn NGINX Fundamentals - YouTube
nginx documentation
HTTP/2 - Wikipedia
Server Name Indication - Wikipedia
Fix "The plain HTTP request was sent to HTTPS port" Error in Nginx

IIS

Hackers Exploiting Microsoft Servers to Mine Monero - Makes $63,000 In 3 Months

Over 70,000 Memcached Servers Still Vulnerable to Remote Hacking
Critical Flaw in Apache Struts2 Lets Hackers Take Over Web Servers
Backdoor Found in Popular Server Management Software used by Hundreds of Companies
Exim Internet Mailer Found Vulnerable to RCE And DoS Bugs; Patch Now
How I Hacked 40 Websites in 7 minutes – Hacker Noon
Two Critical 0-Day Remote Exploits for vBulletin Forum Disclosed Publicly
Securing your Linux web server – Hacker Noon
Where should the web server root directory go in linux? - security, attacks

Web_App_Security

Hacking

Theory

How do you pen test a REST API? - Information Security Stack Exchange
web application - API Security Testing Methodologies - Information Security Stack Exchange
RESTful_API_classical_attacks - Google Sheets
Fuzzing - OWASP
REST Security Cheat Sheet - OWASP
REST Assessment Cheat Sheet - OWASP
API Security Testing – How to Hack an API and Get Away with It (Part 1 of 3)
Pentesting RESTful WebServices v1.0
API Security Testing: Think Like a Bad Guy
Avoid a DDoS Attack with API Testing
PortSwigger Web Security Blog: Cracking the Lens: Targeting HTTP's Hidden Attack-Surface
Types of Penetration Tests | Penetration Testing Tools
Can Anyone Refer a Penetration & Security Testing Tool for RESTful API? - Quora
file:///home/programmersn/Downloads/Cybersecurity-20170815T072300Z-001/Cybersecurity/Pent-testing/securing-restful-api.pdf
Attack Surface Analysis · OWASP Cheat Sheet Series

Practice

Having The Security Rug Pulled Out From Under You - Akamai Security Intelligence and Threat Research Blog

NullByte_Tutorials_Serie

Hacking Web Apps « Null Byte :: WonderHowTo
How to Attack Web Applications with Burp Suite & SQL Injection « Null Byte :: WonderHowTo
How to Successfully Hack a Website in 2016! « Null Byte :: WonderHowTo
Community Byte: HackThisSite Walkthrough, Part 1 - Legal Hacker Training « Null Byte :: WonderHowTo

CRSF

CMS_Hacking

WordPress

Hidden Backdoor Found In WordPress Captcha Plugin Affects Over 300,000 Sites
Thousands of WordPress sites backdoored with malicious code | ZDNet
Keylogger Campaign Hits Over 2,000 WordPress Sites

Une faille zero-day dans le mécanisme de réinitialisation de MdP de WordPress, pourrait permettre à des attaquants de prendre le contrôle

SQL_Injections

PHP_Object_Injection

XSS

Serious XSS flaw discovered in Evernote for Windows, update now! – Naked Security
How to Write an XSS Cookie Stealer in JavaScript to Steal Passwords « Null Byte :: WonderHowTo
Cross-site Scripting (XSS) - OWASP
unescape() room - improving your Cross-Site Scripting (XSS) skills through challenges.

SSRF

SSRF Through Gopher:// – tarun05blog

Path_Traversal

Using_Burp

Beginners Guide to Burpsuite Payloads (Part 2) | Raj Chandel | Pulse | LinkedIn

OWASP Testing Guide v4 Table of Contents - OWASP
steal Api key through ddos attack - Google Search
The Prices vs. Features of Web Application Vulnerability Scanners
GitHub - AresS31/swurg: Parses Swagger files into the BurpSuite for automating RESTful API testing – approved by Burp for inclusion in their official BApp Store.
Bill Sempf | Cracking and Fixing REST APIs
Hack Yourself First: How to go on the Cyber-Offense | Pluralsight
Which tool is better in security testing: ZAP or Burp Suite? - Quora
Zap vs burp
Using an HTTP Proxy and Fuzzer to create test data for a REST API application - YouTube
owasp zap swagger file - Google Search
FAQscanapis · zaproxy/zaproxy Wiki · GitHub
Import API endpoints defined using swagger / openapis · Issue #2034 · zaproxy/zaproxy · GitHub
steal Api key through ddos attack - Google Search
Misconceptions in Client-Side Security: Reverse Engineering Obfuscation & Disguised Endpoints
Part 2: How to stop me harvesting credit card numbers and passwords from your site
#BugBounty — “How I was able to shop for free!”- Payment Price Manipulation
CSS Steals Your Web Data | Hackaday
Web Services Penetration Testing, Part 6: Fuzzing Parameters with Burp
API Security: Offence and Defence 2nd Edition (W35) - Hakin9 - IT Security Magazine
Home · zaproxy/zaproxy Wiki · GitHub
GitHub - flipkart-incubator/Astra: Automated Security Testing For REST API's

Securing

Secure Your REST API (The Right Way)
RESTful API Best Practices and Common Pitfalls – Spencer Schneidenbach – Medium
Top 5 REST API Security Guidelines
API Security in REST vs SOAP
Top-5 stupid security mistakes in web apps – Ivan Novikov – Medium
Top 11 Misconceptions About APIs

GitHub - YalcinYolalan/WSSAT: WEB SERVICE SECURITY ASSESSMENT TOOL
Application Security
Une vulnérabilité critique dans le framework Electron pourrait affecter de nombreuses applications populaires comme Skype, Slack et bien d'autres

How to Make Sure a File is Safe Before Downloading
Source Code Management Tools Affected by Severe Vulnerability
Watch Someone Buy a Laptop for $1 Thanks to a Severe POS Vulnerability
Simple Exploit Allows Attackers to Modify Email Content — Even After It's Sent!
Data leak vulnerabilities patched in Fuze TPN portal | ZDNet
Orange: PHP CVE-2018-5711 - Hanging Websites by a Harmful GIF
New TeamViewer Hack Could Allow Clients to Hijack Viewers' Computer
Critical Oracle Micros POS Flaw Affects Over 300,000 Payment Systems

Infrastructure_and_Network_Security

Serverless_Infrastructures_Hacking

Epsagon emerges from stealth with serverless monitoring tool – TechCrunch

PenTest: Critical Infrastructure Penetration Testing - Pentestmag

Network_Pwning

Attacking_Websocket_Based_Communications

https://www.sans.org/reading-room/whitepapers/detection/spicy-approach-websockets-enhancing-bro%E2%80%99s-websockets-network-analysis-generating-custom-protocol-parser-spicy-38035
How to allow WebSocket traffic with Web Gateway
https://media.blackhat.com/bh-us-12/Briefings/Shekyan/BH_US_12_Shekyan_Toukharian_Hacking_Websocket_Slides.pdf
Would You Let Your Grandma Use WebSockets? | Qualys Blog

Fundamentals

Kellgon - The Hacker Tutorial

DoS_DDoS-Botnets

Memcached_Amplification_Attacks

Large DDoS Amplification Attacks Now Possible Via Memcached Servers
Memcached Servers Abused for Massive Amplification DDoS Attacks
Hackers can compromise Memcached Servers for DDoS attacks
'Kill Switch' to Mitigate Memcached DDoS Attacks — Flush 'Em All
Memcached DDoS Exploit Code and List of 17,000 Vulnerable Servers Released

Meet GhostDNS: The dangerous malware behind IoT botnet targeting banks
GhostDNS: New DNS Changer Botnet Hijacked Over 100,000 Routers
Hack Like a Pro: Denial-of-Service (DoS) Tools & Techniques « Null Byte :: WonderHowTo
What is a DDoS Attack? Attacks Types/Classes - Amplification Techniques - Digital Attack Map
Digital Attack Map - DDOS - Arbor Networks ATLAS® global threat intelligence system. - Google Ideas/Jigsaw - Big Picture Group for graphics visualization
How DDoS Protection Works
complete tutorial defense against ddos - Google Search
New Hakai IoT botnet takes aim at D-Link, Huawei, and Realtek routers | ZDNet
ddos squelching - Google Search
Using IPv6 atomic fragments for a denial-of-service attack
WireX DDoS Botnet: An Army of Thousands of Hacked Android SmartPhones
One of 1st-known Android DDoS malware infects phones in 100 countries | Ars Technica
Feds Shut Down 'Longest-Running' Andromeda Botnet
How Netflix DDoS’d Itself To Help Protect the Entire Internet | WIRED
100,000-strong botnet built on router 0-day could strike at any time | Ars Technica
Feds Shut Down 'Longest-Running' Andromeda Botnet
How can a NULL pointer dereference flaw create a DoS attack?
How does a WebKit framework flaw enable denial-of-service attacks?
Teardrop Attack: What Is It And How Does It Work?
Browser as Botnet, or the Coming War on Your Web Browser
Scarab ransomware: new variant changes tactics - Malwarebytes Labs | Malwarebytes Labs
5 Powerful Botnets Found Exploiting Unpatched GPON Router Flaws
Meet MyloBot malware turning Windows devices into Botnet
Researchers unearth a huge botnet army of 500,000 hacked routers
Google rolls out free cyberattack shield for elections and campaigns - CNET
"Hide and Seek" Becomes First IoT Botnet Capable of Surviving Device Reboots
FAQ - Digital Attack Map
Arbor Networks - Wikipedia
Project Shield - DDOS Mitigations by Google/Jigsaw
Who’s Attacking Whom? Realtime Attack Trackers — digitalattackmap alternatives - Krebs on Security
Network Ingress Filtering: Defeating DoS Denial of Service Attacks which employ IP Source Address Spoofing - Definitive mitigation techniques and best practices proposal to be implemented by ISP and hosting providers - Best Current Practices BCP 38 / RFC 2827
Denial-of-service attack - DDoS - Tear-drop, R-U-Dead-Yet RUDY attacks - SYN Flood/Queue Flooding, half-open connections, SYN Cookies mitigation - UDP-based Amplification/Reflection Attacks as DNS/NTP/SNMP, Bandwidth Amplification Factor per Protocol , DRDoS - Mirai Botnet - Nuke - Phlashing/Permanent aka Bricking the system -
What are the Different Types of DDoS Attacks? Definitive Attacks Types Classification Breakdown by OSI layers - by Arbor Networks Products/Solutions - Content Delvery Networks weaknesses - MTU Maximum Transmission Unit - IPSec Flood Attack | NETSCOUT
Spoofed IP Address Distributed Denial of Service Attacks: Defense-in-Depth
DDoS Attack Defense against Source IP Address Spoofing Attacks - de71d24276b35f6b2e397a2cf502fc946c6b.pdf
SYN flood - DDOS Attack Technique - TCP three way handshake - Mitigations, SYN Cache/Cookies - Network Congestion
The GitHub Memcached DDoS: It shouldn't have happened - mitigation | Synopsys
memcached Reflection/Amplification Description and DDoS Attack Mitigation Recommendations | NETSCOUT
Understanding DDoS Attacks & The Tools to See Them. - Visualization Attack
What Is a Distributed Denial-of-Service (DDoS) Attack? Mitigation techniques - OSI Model - Attacks types - Volumetric, Protocol-based, Application layer - DNS Amplification, SYN Flood | Cloudflare
Classifications of DDos attacks based on the protocol and on the mechanism of action: a short overview of modern approaches - Three classes of attacks : Volumetric/Flooding, Protocol-based/State-Exhaustion, Application-level - OSI Layers
Classification of DDoS Attacks and their Defense Techniques using Intrusion Prevention System
DDoS Attack Types & Mitigation Methods - classification - common types Syn Floods | Bps Bits per second, Pps Packets per second, Rps Requests per second
DDoS attacks and defense mechanisms: classificationand state-of-the-art - definitive academic paper
Types of DDoS attacks - definitive temrinilogy definitions | DDoS-GUARD knowledge Base
CharGEN Flood DDOS Attack - UDP port 19- Source IP spoofing
What is an IP Fragmentation Attack (TCP/Teardrop ICMP/UDP) and Mitigations - definitive - MTU - Example of how an IP datagram is fragmented and reassembled | Imperva
Denial of Service - Buffer Overflows
Classification/Taxonomy of DoS Attacks by Level of OSI Layer - definitive table - spoofed/non-spoofed IP source | INCIBE-CERT
What is a Volumetric DDoS Attack? ICMP Flood, IP/ICMP Fragmentation, IPSec Flood, UDP Flood, DNS Query/NXDOMAIN Flooding, Reflection Amplifications | NETSCOUT
What is a State-Exhaustion/Protocol Attack? SYN Flood, TCP Floods, SSL/TLS Exhaustion, DNS Query/NXDOMAIN Flooding - Mitigations, behavioral analysis, deep packet analysis
What is an Application Layer Attack? BGP Hijacking, Long Lived TCP Sessions, Slowloris, Slow post, Slow Read, HTTP/s Flooding, CVE Attack Vector, Large Payload POST, Mimicked Browsing | NETSCOUT
Amplification DDoS Attacks - definitive classification - TCP-based abusing synchronization three way handshake - Abusing UDP-based protocols as DNS, NTP, CharGEN, SSDP, RIPv1, Memcached - Abusing other protocols as ICMP, L2TP, SNMP, RCPBind/PortMapper, SQL RS Reporting System
Krebs Site Targetted With Mirai Botnet based DDOS Attack — Krebs on Security
Best DOS Attacks and Free DOS Attacking Tools [Updated for 2019] - Classification
Technique: Endpoint Denial of Service DDoS - Protocol-based/State-Exhaustion/OS Exhaustion Attacks as SYN Flood, ACK Flood - Service/Application layer Attacks -- Concurrent TCP Connections
Technique: Network Denial of Service - Volumetric/Bandwidth Exhaustion Attacks - DDOS - DNS/NTP Reflection Amplification, Flood - Mitigations - MITRE ATT&CK™
2016 Dyn DNS Provider cyberattack - DDOS through IoT devices-zombies infected with Mirai Botnet
Why IoT Botnets Are So Lucrative For Cybercriminals - Mirai, 2016 Dyn attack| NETSCOUT
What is a TCP SYN Flood aka Half-Open attacks - Mitigation methods as Micro blocks, SYN cookies, RST reset cookies, Stack tweaking
Memcrashed - Major Memcached amplification attacks from UDP port 11211
SYN Flood/Half-Open DDoS Attack - Direct/Spoofed/Distributed Attacks - definitive - spoofed SYN packets - ISP help in tracking spoofed packets - Mirai botnet - vs Volumetric/Bandwith-saturation/exhaustion attack - OS backlog queue - Mitigations as Backlog queue length increase, Oldest Half-Open connections recycling, SYN Cookies
What is a DDoS Botnet - types of botnets, network topologies - Mitigations - definitive
Hardening the TCP/IP stack to SYN flooding/spoofing attacks - definitive technical details - - Operating System Backlog queue handles incoming packets with SYN flag waiting for the three way handshake to complete (half-open connections) - Mitigations/detections and builtin protection techniques in Windows and Linux, as Increasing OS backlog queue and minimizing time of pending/half-open connections handling
RFC 4987 - TCP SYN Flooding Attacks and Common Mitigations - definitive guide - Transmission Control Block TCB - Backlog - Spoofed IP Address Selection/Generation - RST/reset TCP Segment - DDoS
Defending against a Denial-of-Service Attack on TCP - SYN Flood - OS TCP Backlog
How to Detect and Prevent SYN Flood Attack In Linux - Mitigations - Backlog queue increase
Hardening your Linux TCP/IP Stack Against SYN Floods - SYN Cookies - Network Hardening
SYN Flood - TCB Table - Mitigations Micro-Blocks Allocations, SYN Cookies, Stack Tweaking
What is a SYN Flood Attack? | NETSCOUT
What is an HTTP Get/Post Flood | DDoS Attack Glossary | Imperva
What is a DDoS Botnet | Common Botnets and Botnet Tools - Control And Commands C2 servers - Nitol, IMDDOS, Avzhan, ChinaZ, MrBlack, Cyclone, Pushdo, Cutwall
HTTP Flood DDoS Attack | Cloudflare
Memcached DDoS Attack | Cloudflare
NTP Amplification DDoS Attack | DNS Flood/Amplification
SSDP DDoS Attack | Cloudflare
What is a DNS Flood? | Cloudflare
UDP Flood DDoS Attack | Cloudflare
Ping (ICMP) Flood DDoS Attack | Cloudflare
What Is A Low And Slow Attack? Low And Slow DDoS Attack Definition | Cloudflare
Application Layer DDoS Attack | Cloudflare
Why are cryptocurrency sites being targeted by DDoS attacks? What is a cryptocurrency? Blockchain, centralized/decentralized, mining
Smurf DDoS Attack | Cloudflare
Ping of Death DDoS attack | ICMP
What are HTTP GET/POST flood attacks? Intrusion Prevetion System IPS rules
What DDoS Attacks Mean for Mobile Games, ISPs and Video Gaming Servers - Mitigation through VPNs and GRE
Down the Rabbit Hole: The Making of Cloudflare Warp - GRE, Legacy VPN protocol PPTP - Load Balancing - MTU compatibility issue
How a Massive 540 Gb/sec DDoS Attack Failed to Spoil the Rio Olympics - GRE packets flood - Lizard Stresser DDoS for hire service
Breaking Down Mirai: An IoT DDoS Botnet Analysis - GRE flood
The Mirai Botnet - definitive GRE Flood DDoS attack explanation, triggers resources exhaustion because of the computing power required for GRE packets de-encapsulation
GitHub - jgamblin/Mirai-Source-Code: Leaked Mirai Source Code for Research/IoC Development Purposes - Mirai botnet malware
Mirai-Source-Code/ForumPost.md at master · jgamblin/Mirai-Source-Code - Mirai botnet malware - original post from Anna-Senpai
ip - GRE DDOS -- Wouldn't the firewall block it? - Information Security Stack Exchange
Mirai IoT DDoS Botnet Source Code Reveals Specific Targeting Of Valve Source Engine Games On Steam | HotHardware - GRE Flood
Mirai: The IoT Bot that Took Down Krebs and Launched a Tbps Attack on OVH - IP defragmentation through GRE IP/Eth DDoS Flood Attack - definitive visual explanation - DNS Water Torture
IoT Attack Handbook - A Field Guide to Understanding IoT Attacks from the Mirai Botnet to Its Modern Variants - GRE IP Attack - Definitive Breakdown
CyberX Reveals How Mirai Uses GRE Floods to Generate Largest DDoS Attack on Record - Mirai malware analysis - reverse engineering
Mirai: what you need to know about the botnet behind recent major DDoS attacks | Symantec Connect Community
GRE tunneling: Keeping human traffic unaffected during DDoS attacks
How Google fought back against a crippling IoT- DDoS powered botnet and won | Project Shield - KrebsOnSecurity Mirai attack
Why the silencing of KrebsOnSecurity opens a troubling chapter for the ‘Net | DDoS, Mirai botnet
Inside the infamous Mirai IoT Botnet: A Retrospective Analysis - DDoS
Attackers Leveraged Large CCTV Botnet to Launch DDoS Attacks
Another Lizard Arrested, Lizard Lair Hacked — Hacking Group Lizard Sqaud DDoS for Hire Lizard Stresser service hacked
Lizard Stresser DDoS Service of ‘Lizard Squad’ Gets Hacked, 14k Users Exposed
What Is a Distributed Denial-of-Service (DDoS) Attack? | DNS Amplification - mitigations, black hole routing, rate limiting, WAF, anycast network diffusion
DNS Flood - Bandwith Exhaustion/Volumetric DDoS attack
Black hole (networking) - DDoS Mitigation
What is DNS - Amplification/Flood DDoS Attacks
DNS Amplification DDoS Attack - Mitigations, ISPs ingress filtering
Reflections on reflection (attacks) - definitive in depth analysis on UDP-based Amplification/Reflection DDoS attacks - NTP, SSDP, IP fragmentation, DNS, SRCDS, CHARGEN, Call of Duty, SNMP, CLDAP, Sunrpc, Netbios, HTTP, SRCDS, RIP
Web application security: Are you safe against Layer 7 Application DDoS attacks?
How to prevent NTP DDoS amplification attacks | AARNet News
DoS (Denial of Service) Attack Tutorial: Ping of Death, DDOS - Smurf, Buffer overlow, teardrop, SYN attack
BCP38 is RFC2827: Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing - DDoS

Spoofing

IP_Spoofing

IP address spoofing - Wikipedia
The real cause of large DDoS - IP Spoofing
network - Why don't ISPs filter on source address to prevent spoofing? - Information Security Stack Exchange
IP Spoofing: Fundamentals and counter-measures - 1&1 IONOS
Addressing the challenge of IP spoofing | Internet Society
Why can't ISPs block spoofed packets? - Upgrade Magazine
What is IP Spoofing - Mitigation through Packet filtering - Used in NTP/DNS Amplification DDoS Attacks
Can one use IP-spoofing to anonymize DDOS attacks? amplification - Information Security Stack Exchange
Would an ISP know if someone spoofed their IP address? - Quora
What is IP Spoofing? How to protect yourself? DDOS - MitM - Malware distribution | NordVPN

MAC_Spoofing_Attacks

How (and Why) to Change Your MAC Address on Windows, Linux, and Mac
MAC spoofing
Hacking Knowledge - The Power of Spoofing MAC Address • Raymond.CC
How to Hack Open Hotel, Airplane & Coffee Shop Wi-Fi with MAC Address Spoofing - mitigation « Null Byte :: WonderHowTo

Website_Spoofing

Website spoofing - phishing
Hack Like a Pro: How to Clone Any Website Using HTTrack « Null Byte :: WonderHowTo

DNS_Spoofing

DNS spoofing - cache poisoning
Hack Like a Pro: How to Spoof DNS on a LAN to Redirect Traffic to Your Fake Website « Null Byte :: WonderHowTo

Wireless_Access_Point_Spoofing

How to Hack Wi-Fi: Creating an Evil Twin Wireless Access Point to Eavesdrop on Data « Null Byte :: WonderHowTo
Mitigating a Spoofed AP - access point - Cisco Meraki
Evil twin (wireless networks) - Rogue Wireless Access Points - Spoofing - Phishing - Wikipedia

Spoofing attack - TCP/IP - Referrer - Caller ID - Email address - Geolocation - GPS - Wikipedia
How do fake emailers work? - Information Security Stack Exchange
GitHub - WiPi-Hunter/PiDense: 📡Monitor illegal wireless network activities. (Fake Access Points)
The Rogue Toolkit - An Extensible Toolkit Aimed At Providing Penetration Testers An Easy-To-Use Platform To Deploy Access Points - KitPloit - PenTest Tools for your Security Arsenal ☣
one-minute-attack-let-hackers-spoof-hotel-master-keys
Protocol spoofing - different from spoofin attack in security
IDN homograph attack - script spoofing - alphabet representations mixing

Network_Monitoring_Sniffing

Monitoring_Tools

Zabbix

Enabling_Zabbix_Mapping_Feature

[TUTORIAL] how to make a ZABBIX map with cautome background - YouTube

NagiOS

Nagios : apprendre, installer et configurer - débutants
How to Install Nagios 4 in Ubuntu and Debian

Traffic_Sniffing_Analyzing_Tampering

Free Projects Download,Java, DotNet projects, Unlimited Free Downloads, documentation, source code, ieee projects, dot net ieee projects, java ieee projects, advanced java, core java, oracle, mysql, asp.net, c#.net, c sharp, sql server, ms.net, ms access,…

Websocket_Traffic_Sniffing

How can I capture websocket traffic · Issue #899 · mitmproxy/mitmproxy · GitHub
WebSockets in UI · Issue #2929 · mitmproxy/mitmproxy · GitHub
WSSiP - Application for capturing, modifying and sending custom WebSocket data from client to server and vice versa - hacking deep hunter
wssip windows - Google Search
wssip/README.md at master · nccgroup/wssip · GitHub
WSSiP - Application for capturing, modifying and sending custom WebSocket data from client to server and vice versa - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Man In The Middle (MITM) SSL Proxies - Simple ways to see traffic between an SSL server and client in clear text. · GitHub
Add support for non-HTTP flows to the UI - Websocket support
mitmproxy/websockets.py at master · mitmproxy/mitmproxy · GitHub
Events - websocket event capture, among others - mitmproxy docs
WebSocket Messages should be shown to the user. · Issue #1547 · mitmproxy/mitmproxy · GitHub
Replace our WebSocket stack with wsproto by Kriechi · Pull Request #2545 · mitmproxy/mitmproxy · GitHub
mitmproxy/websocket.py at master · mitmproxy/mitmproxy · GitHub
Packet sniffer using jpcap
Protocols Supported by MitMProxy - websocket, http/2, raw TCP/TCP Proxy /Fallback
Events - websocket event capture, among others - mitmproxy docs

Man In The Middle (MITM) SSL Proxies - Simple ways to see traffic between an SSL server and client in clear text. · GitHub
develop websocket sniffer - Google Search

MiTM-like_Attacks

Packet_Crafting

15 Best Free Packet Crafting Tools
Packet crafting - Wikipedia

network - What's the difference between mitm attack and sniffing? - Information Security Stack Exchange
Ettercap - A Comprehensive Suite For Man In The Middle Attacks - KitPloit - PenTest Tools for your Security Arsenal ☣
What is the difference between MITMproxy and SSLsplit? - Information Security Stack Exchange
Mitmproxy tampering GET and POST request/response in one script - Stack Overflow
mitmproxy MITM – My Cyber Security Blog
Hack Like a Pro: How to Conduct a Simple Man-in-the-Middle Attack « Null Byte :: WonderHowTo
ISPs May Be Helping Hackers to Infect you with FinFisher Spyware
Man-in-the-middle attack - Wikipedia
Man-in-the-browser - Wikipedia
Man-on-the-side attack - Wikipedia
How to Create an Evil Access Point with MitmAP « Null Byte :: WonderHowTo
Ettercap (software) - Wikipedia
ettercap vs wireshark at DuckDuckGo
Injectify - Perform Advanced MiTM Attacks On Websites With Ease - KitPloit - PenTest Tools for your Security Arsenal ☣
mitmproxy - an interactive HTTPS proxy
Tutorial: Reverse Engineering a Private API Using MITM attack | Toptal
TOWARDS USABLE AND FINE-GRAINED SECURITY FOR HTTPS WITH MIDDLEBOXES - Thesis- MASc-KhannaAbhimanyu-2017.pdf
Decrypting TLS Browser Traffic With Wireshark – The Easy Way! | Jim Shaver
Transparent SSL Interception Bridge with mitmproxy
Charles Web Debugging Proxy • HTTP Monitor / HTTP Proxy / HTTPS & SSL Proxy / Reverse Proxy
stut-it Martin Stut - Mitmproxy Cheat Sheet
stut-it Martin Stut - Watching a Windows Machine's Internet Traffic With Mitmproxy
HTTP Public Key Pinning - Wikipedia
windows - Inspecting websocket traffic with proxy - Super User
Configure Fiddler to decrypt HTTPS traffic - Progress Telerik Fiddler

Comparison of packet analyzers - Wikipedia
Packet analyzer - Wikipedia
wireshark - Difference between sniffer tools - Network Engineering Stack Exchange
How to Spy on Your "Buddy's" Network Traffic: An Intro to Wireshark and the OSI Model « Null Byte :: WonderHowTo
Packet Analysis with Wireshark (W37) - Hakin9 - IT Security Magazine
Microsoft Network Monitor - Wikipedia
Microsoft Message Analyzer Operating Guide - Message Analyzer | Microsoft Docs
Message Analyzer Tutorial - Message Analyzer | Microsoft Docs
Netmon Inc. | DCIM / ITSM Tools Netmon and AKCP Authorized Distributor
microsoft message analyzer vs wireshark at DuckDuckGo
winpcap npcap at DuckDuckGo
Filter by process/PID in Wireshark - Stack Overflow
Capture and explore network traffic with Microsoft Message Analyzer
Bettercap : MITM attack for sniffing traffic and passwords :Bettercap – HACK a DAY
RawCap - A raw socket sniffer for Windows
Process Monitor - Windows Sysinternals | Microsoft Docs
SocketSniff - Windows Sockets (WinSock) Sniffer
The Pappy Proxy
TCPView for Windows - Windows Sysinternals | Microsoft Docs
Configure a PHP/cURL application to use Fiddler - Progress Telerik Fiddler
windows - Why Doesn't Fiddler Show Curl Traffic? - Stack Overflow
Sniffing TCP traffic for specific process using Wireshark - Reverse Engineering Stack Exchange
windows - Sniff traffic coming from one particular application? - Super User
windows 7 - Capture traffic for specific application - Super User
Proxocket - A Winsock Proxy Sniffer - NETRESEC Blog
WinPcap: NPF - netgroup packet filter - driver internals manual
Promiscuous mode - mode for a wired network interface controller (NIC) or wireless network interface controller (WNIC) that causes the controller to pass all traffic it receives to the central processing unit (CPU) rather than passing only the frames that the controller is specifically programmed to receive. This mode is normally used for packet sniffing that takes place on a router or on a computer connected to a wired network or one being part of a wireless LAN. Interfaces are placed into promiscuous mode by software bridges often used with hardware virtualization - switch
linux - How to capture all incoming packets to NIC even those packets are not belonging to me - network monitoring/sniffing - switch vs hub - switch port mirroring - security - promiscuous mode - tcpdump -p
Illustrated Guide to Monitoring and Tuning the Linux Networking Stack: Receiving Data - definitive in depths technica/visual epxlanation with diagrams

Injecting chaos experiments into security log pipelines | Opensource.com
network monitoring vs sniffing - Google Search
Wireless Sniffers – Sniffing Tools in Ethical Hacking
4 Ways to Capture NTLM Hashes in Network
SJET - JMX Exploitation Toolkit - KitPloit - PenTest Tools for your Security Arsenal ☣
Secure channel - Wikipedia
Packet Sniffing in Windows and Linux Using Python
snooping vs sniffing at DuckDuckGo
Malicious Packet Analysis & Network Defense (W32) - Hakin9 - IT Security Magazine

Wireless_Network_Cracking

WiFi_Hacking

KRACK_WPA2_attack

wifi - Consequences of the WPA2 KRACK attack - Information Security Stack Exchange
How to Protect Yourself from the KRACK Attacks WPA2 Wi-Fi Vulnerability « Null Byte :: WonderHowTo
Release the KRACKen: WPA2 Wi-Fi Encryption Hackable Until All Clients & APs Are Patched « Null Byte :: WonderHowTo
Google Fixes The KRACK WiFi Exploit For Android, Download OTA Now
Krack wi-fi security flaw explained - BBC News
Why the Krack Wi-Fi Mess Will Take Decades to Clean Up | WIRED
The Flawed System Behind the Krack Wi-Fi Meltdown | WIRED
Kali on KRACK | Kali Linux
KRACK Detector - Detect and prevent KRACK attacks in your network - KitPloit - PenTest Tools for your Security Arsenal ☣
KRACK Vulnerability Makes Wi-Fi Hacking Possible, Leaving Millions of Devices Exposed | WIRED

https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-chen_0.pdf
New security flaw discovered in Wi-Fi routers | News
Wireless Security & Hacking (W31) - Hakin9 - IT Security Magazine

ROCA_Attack

Serious Crypto-Flaw Lets Hackers Recover Private RSA Keys Used in Billions of Devices
Forget KRACK Attack, 5 Year Old Encryption Bug ROCA Returns For Google And Microsoft

About_WEP_Vulns

WiFi (in)Security - Why WEP is no longer capable of protecting your WiFi
How to decode WPA/WEP keys using Penetrate Pro - Coding Security
How to Hack Wi-Fi: Cracking WEP Passwords with Aircrack-Ng « Null Byte :: WonderHowTo

WiFi_Jamming

hacking how to interfere with public wifi hotspot - Google Search
Hack Like a Pro: How to Get Even with Your Annoying Neighbor by Bumping Them Off Their WiFi Network —Undetected « Null Byte :: WonderHowTo
WifiKill - Disabling WiFi for Other Devices - Coding Security

how to spot the location of a wireless access point - Google Search
How to Hack Wi-Fi: Getting Started with the Aircrack-Ng Suite of Wi-Fi Hacking Tools « Null Byte :: WonderHowTo
There's a Right Way and Wrong Way to Use Public Wi-Fi
how to spot the location of a wireless access point - Google Search
How Hackers Kick Victims Off of Wireless Networks
Hackers are targeting hotel Wi-Fi with particularly evil malware – BGR
I play the security odds at Defcon by rolling the Wi-Fi dice - CNET
Researcher Discloses 10 Zero-Day Flaws in D-Link 850L Wireless Routers
WiFi Hacking From a Penetration Testers Perspective | Udemy
Millions Of Smartphones Using Broadcom Wi-Fi Chip Can Be Hacked Over-the-Air
Why Using a Public Wi-Fi Network Can Be Dangerous, Even When Accessing Encrypted Websites
Keep Your Windows Computer Secure on Public Wireless Hotspots
How to Wardrive on an Android Phone to Map Vulnerable Networks « Null Byte :: WonderHowTo
Pixie Dust Attack WPS with Reaver - Coding Security
Why WPA2-PSK can be a security risk even with an uncracked key
Hacking WPA/WPA2 without dictionary/bruteforce using Fluxion » TechWorm
How to find Wi-Fi password of all Connected Networks using CMD » TechWorm
Hacking wifi using reaver kali linux - Coding Security
whitepaper lp - 802.1x
GitHub - WarenGonzaga/WiFi-Passview: An open source batch script based WiFi Passview for Windows!

WPA3

wpa3-wi-fi-security-passwords-easy-connect - WIRED
WPA3 Standard Officially Launches With New Wi-Fi Security Features
WiFi's tougher WPA3 security is ready

Bluetooth_Hacking

Bluetooth Hacking « Null Byte :: WonderHowTo
Bluetooth Low Energy Hacking - Hakin9 - IT Security Magazine
BlueBorne: Critical Bluetooth Attack Puts Billions of Devices at Risk of Hacking
Understanding Bluetooth Security | Duo Security
IoT Hacking – Beginner’s Guide to Hacking Bluetooth Low Energy (BLE) – Part 2 | Blog for IoT Security
Turn Bluetooth Off When You're Not Using It | WIRED

Phone_Communications-Cellular_Nets

A 'Scarily Simple' Bug Put Millions of Cox Communications Customers at Risk | WIRED
how to track a phone call to caller - Google Search
Tracking phone location - Quora
how to track a phone call to caller - Google Search
This Teenager Hacked 4G LTE Network And Is Using Free Internet
New 4G LTE Network Attacks Let Hackers Spy, Track, Spoof and Spam
Attacks on 4G LTE networks could send fake emergency alerts
Researchers Uncover New Attacks Against LTE Network Protocol

RFID-NFC_Attacks

Software Defined Radio Attack Tool: RFCrack
Hackers can takeover & control emergency alarm system with a $35 radio
Have an NFC-Enable Phone? This Hack Could Hijack It « Null Byte :: WonderHowTo
rfid vs nfc security at DuckDuckGo
Security Risks of Near Field Communication Technology
How does Near Field Communication (NFC) compare to RFID technologies? Looking for a functional primer - Information Security Stack Exchange

How to Hack Wi-Fi: Cracking WPA2-PSK Passwords Using Aircrack-Ng « Null Byte :: WonderHowTo
How to Hack Wi-Fi: Get Anyone's Wi-Fi Password Without Cracking Using Wifiphisher « Null Byte :: WonderHowTo
How to Hack Wi-Fi: Capturing WPA Passwords by Targeting Users with a Fluxion Attack « Null Byte :: WonderHowTo
How to Map Networks & Connect to Discovered Devices Using Your Phone « Null Byte :: WonderHowTo
Hacking a Bird in the Sky: Hijacking VSAT Connection
Small satellite terminals (VSAT) are vulnerable to Cyber attack
Ships Can Be Hacked By Exploiting VSAT Communication System
Remotely hacking ships is now a thing, and it's a problem
Hacker Cracks Satellite Communications Network - News
Satellite Communications Wide Open To Hackers
Ethical Hacking: Hacking Wireless Networks | Pluralsight
wifi - Can he see the websites I visited? - Information Security Stack Exchange
Hackers Can Silently Control Siri, Alexa & Other Voice Assistants Using Ultrasound
Wireless Security- InfoSec
This Radio Hacker Could Hijack Emergency Sirens to Play Any Sound | WIRED
Wireless Security Attacks (W18) - eForensics

Honeypots

how to defeat honeypot server - Google Search
Hack Like a Pro: How to Set Up a Honeypot & How to Avoid Them « Null Byte :: WonderHowTo
Catching the hackers in the act - BBC News
Honeypot (computing) - Wikipedia
Deception tech helps to thwart hackers' attacks - BBC News
What is Honeyspot? - InfoSec Addicts

Cloud_Security

AWS

S3 Buckets for Good and Evil | Pentest Armoury
Abusing the AWS metadata service using SSRF vulnerabilities - Christophe Tafani-Dereeper

Hackers Can Stealthily Avoid Traps Set to Defend Amazon's Cloud | WIRED
Western Digital's My Cloud NAS Devices Turn Out to Be Easily Hacked

Hacking_Air-Gapped_Devices

Hacker Can Steal Data from Air-Gapped Computers Using IR CCTV Cameras
Le clignotement d'un disque dur peut être utilisé pour dérober des données sensibles, des universitaires israéliens le mettent en évidence
Hackers Can Now Steal Data Even From Faraday Cage Air-Gapped Computers
Air Gap Hacker Mordechai Guri Steals Data With Noise, Light, and Magnets | WIRED
Are air gaps entirely impermeable? Then you don't know Ben-Gurion team's research
Hacker Can Steal Data from Air-Gapped Computers through Power Lines

Satellite_Communications

Backdoor Account Found in Popular Ship Satellite Communications System
Hackers can Exploit Load Planning Software to Capsize Balance of Large Vessels

Attacking_DHCP_Servers

Red Hat Linux DHCP Client Found Vulnerable to Command Injection Attacks

DNS_Server_Attacks

Spoofing DNS with fragments | PowerDNS Blog
How's that encryption coming, buddy? DNS requests routinely spied on, boffins claim • The Register
Extending attack surface in distributed environments - Pentestmag
DNS over HTTPS · curl/curl Wiki · GitHub
Google hacker found a critical flaw in Blizzard Games that expose millions of PCs to DNS Rebinding attacksSecurity Affairs
New Point-of-Sale Malware Steals Credit Card Data via DNS Queries

Mail_Protocols_Hacking

Mail Server Security: Potential Vulnerabilities and Protection Methods
Email Protocols: What are the advantages and disadvantages of IMAP versus POP3? - Quora
Testing for IMAP/SMTP Injection (OTG-INPVAL-011) - OWASP
POP IMAP WEB
Increase Email Security with IMAP Protocol Instead of Using POP Mail

Firewalls

16 iptables tips and tricks for sysadmins | Opensource.com
Pare-feu -- E. Godard
Linux firewalls: What you need to know about iptables and firewalld | Opensource.com
What is a Firewall? What does it do? - Coding Security
Firewall Bursting: A New Approach to Better Branch Security
WhatWaf - Detect And Bypass Web Application Firewalls And Protection Systems - KitPloit - PenTest Tools for your Security Arsenal ☣
Bypass Firewall Restrictions with Metasploit (reverse_tcp_allports) | Raj Chandel | Pulse | LinkedIn
GitHub - LeonBroseliske/CFC: Centralized Firewall Control
Tunneling Traffic Through DNS to Bypass Firewalls - DDoS Attacks
Firewalls: What They Are & Why You Need Them
Bypassing Web Application Firewall (W30) - Hakin9 - IT Security Magazine
waf vs firewal at DuckDuckGo
What is a WAF? | Web Application Firewall explained | Cloudflare
Web application firewall - WAF
How we made Firewall Rules - ASN matching
Introduction of Firewall in Computer Network - ACLs, next generation firewall - Host based, network based

LDAP_Based_Services_Hacking

Active_Directory

Active Directory Security – Active Directory & Enterprise Security, Methods to Secure Active Directory, Attack Methods & Effective Defenses, PowerShell, Tech Notes, & Geek Trivia…
hacking active directory - Google Search
GitHub - DanMcInerney/icebreaker: Gets plaintext Active Directory credentials if you're on the internal network.
GitHub - l0ss/Grouper: A PowerShell script for helping to find vulnerable settings in AD Group Policy.
Automate Network Attacks Against Active Directory: icebreaker
Beyond LLMNR/NBNS Spoofing – Exploiting Active Directory-Integrated DNS

VoIP_Hacking

Listen to a VOIP call with Wireshark - Coding Security

Routers_And_Networking_Devices_Hacking

Cisco zero-day exploited in the wild to crash and reload devices | ZDNet
RouterSploit v3.4.0 - Exploitation Framework For Embedded Devices - KitPloit - PenTest Tools for your Security Arsenal ☣
Serious D-Link router security flaws may never be patched – Naked Security
New Exploit for MikroTik Router WinBox Vulnerability Gives Full Root Access
A mysterious grey-hat is patching people's outdated MikroTik routers | ZDNet
MikroTik router vulnerability lets hackers bypass firewall to load malware undetected
Flaw in 4GEE WiFi Modem Could Leave Your Computer Vulnerable
Motherboard Hacking Livestream: How to Pwn a Router - Motherboard
Hackers Took Over My Router and I Had NO Clue
router acl - Google Search
Beware! Dozens of Linksys Wi-Fi Router Models Vulnerable to Multiple Flaws
Hacking the Sonoff Wifi Switch - Part 1
Researcher found multiple vulnerabilities in NETGEAR Routers, update them now!Security Affairs
Hack Like a Pro: How to Find Any Router's Web Interface Using Shodan « Null Byte :: WonderHowTo
Critical flaw leaves thousands of Cisco Switches vulnerable to remote hacking
Router reboot, updates, password are key to home network security
How insecure is your router? | Opensource.com
How to Protect Your Router From the Latest Malware Attack
FBI Urges Everyone to Reboot All Routers Immediately | Digital Trends
Hackers are exploiting a new zero-day flaw in GPON routers
DrayTek Router Zero-Day Under Attack
Here's how hackers are targeting Cisco Network Switches in Russia and Iran
This new router exploit is the motivation you need to switch to a mesh solution | Android Central
networking - Reaching a device in my LAN from the Internet - internal/private IP access - Port forwarding security - VPN - SSH - subnetwork isolation/partitionning

ISP_Pwning

How i hacked my Internet Service Provider and automated the attack. ( Hacked to Learn)

P2P-Torrenting_Security_Risks

torrent clients security dangers at DuckDuckGo

testing S3 security - Google Search
New “Quad9” DNS service blocks malicious domains for everyone – Ars Technica
Wireless vs Wired network security comparison - Google Sheets
WLAN security: Best practices for wireless network security
Cloud security best practices - Google Sheets
testing S3 security - Google Search
Overcoming ransomware threat - Google Sheets
Vulnerability remediation of WannaCry flaw raises concerns
Risk & Repeat: WannaCry ransomware worm shakes tech industry
public key infrastructure - How does SSL/TLS PKI work? - Information Security Stack Exchange
DMZ (computing) - Wikipedia
10 network security tools everyone should use.pdf
networking - Why does encryption not destroy the way networks work? - Super User
The security pros and cons of using a free FTP tool
How does IP hijacking work and how can it be prevented?
What REALLY Happened with the Juniper Networks Hack? « Null Byte :: WonderHowTo
Software defined radio · AnarchoTechNYC/meta Wiki
Ethical Hacking: Sniffing | Pluralsight
DNS resolver 9.9.9.9 will check requests against IBM threat database • The Register
Net filters help avoid dodgy domains - BBC News
dns hijacking vs dns poisoning - Google Search
Nethammer—Exploiting DRAM Rowhammer Bug Through Network Requests
Basic Network Attacks in Computer Network - GeeksforGeeks

NTP_Security

Attacking the Network Time Protocol - NTP security - DDoS - Kiss Of Death KoD
NTP server misuse and abuse - security - attacks - embedded devices, IoT - reflection/amplification NTP DDoS
datacenter - What is an acceptable secure time source in a datacentre environment? - Server Fault
Best Practices for NTP Services - BCP
Don't update NTP – stop using it - security vulnerabilities, vs tlsupdate - attacks - HTTPS HSTS, NTP MitM tool Delorean - TLS
NTP security - MAC, NTS, and MS-SNTP - Authentication Support - crypto-nak - NTS network time security
Welcome to NTPsec - definitive reference - Welcome to the NTPsec project - a secure, hardened, and improved implementation of Network Time Protocol derived from NTP Classic, Dave Mills’s original
NTP Security Analysis
NTP "NAK to the Future" - crypto-nak packets - vulnerability -
Security Evaluation of NTP - cisco - crypto-nak - vulnerabilities
Authentication Support - description of the various cryptographic authentication provisions in NTPv4 -
Analysis of Vulnerability CVE-2016-4957 in NTPD - daemon - crypto-nak
NTP : Security vulnerabilities

Databases_Security

Database-Big_Data_Security

Big Data and Cybersecurity: Opportunity or Threat?
MySQL UDF Exploitation | 🔐Blog of Osanda
SQL Injection 101: Database & SQL Basics Every Hacker Needs to Know « Null Byte :: WonderHowTo
Learning Pentesting with Metasploitable3: Exploiting Elasticsearch

MIT CSAIL Parallel and Distributed Operating Systems Group

Owning_Virtualization_Systems

Attack Uses Docker Containers To Hide, Persist and Plant Malware | Threatpost | The first stop for security news
VMware Patches Bug That Allows Guest to Execute Code on Host | Threatpost | The first stop for security news

UTM, SIEM. What's the difference?
What is Cyber Resilience and why should you care? | Prashant Chaturvedi | LinkedIn
Unified Threat Management - Wikipedia
Preventing Network Security Threats
PenTest: Critical Infrastructure Penetration Testing - Pentestmag

Mobile_Security

Android

Android_Device_Rooting

Android Malware Analysis - eForensics
Google Adds Control-Flow Integrity to Beef up Android Kernel Security
Drozer v2.4.4 - The Leading Security Assessment Framework For Android - KitPloit - PenTest Tools for your Security Arsenal ☣
Android password managers vulnerable to phishing apps – Naked Security
Malware on Android: The 5 Types You Really Need to Know About
All Android versions affected by this vulnerability, except Pie | Pocketnow
Millions of Android Devices Are Vulnerable Out of the Box
Marcher Android Banking Trojan Combines 3 Threats Into 1 Scheme
honor 8 encryption robustness - Google Search
Toast overlay being used by malicious Android apps to install additional malware
Google Begins Removing Play Store Apps Misusing Android Accessibility Services
How to Hack Android Using Kali (Remotely) « Null Byte :: WonderHowTo
Toast Overlay Message Exploit Found on the Google Play Store
Another Shady App Found Pre-Installed on OnePlus Phones that Collects System Logs
This malware turns itself into ransomware if you try to remove it
Android Apps Infected with Sockbot Malware Turn Devices into Botnet
This nasty new Android ransomware encrypts your phone -- and changes your PIN | ZDNet
First Android Malware Found Exploiting Dirty COW Linux Flaw to Gain Root Privileges
Android malware in Google Play racked up 4.2M downloads: Are you a victim? | ZDNet
Over 500 Android Apps On Google Play Store Found Spying On 100 Million Users
CopyCat malware infected 14 million outdated Android devices
The 'Cloak & Dagger' Attack That Bedeviled Android For Months | WIRED
Google Adds New Behavior-Based Malware Scanner To Every Android Device
Faketoken Android Malware Can Steal Victims’ Calls, Texts, and Credit Cards – The Merkle
5 of the Most Dangerous Android Viruses and How to Get Rid of Them – Incognisys
Google Detects Dangerous Spyware Apps On Android Play Store
This Android malware steals data from 40 apps, spies on messages and location | ZDNet
Thousands of Android Apps Infected with SonicSpy Spyware
All Android Phones Vulnerable to Extremely Dangerous Full Device Takeover Attack
How did firmware create an Android backdoor in budget devices?
Android Trojan Now Targets Non-Banking Apps that Require Card Payments
Google Play Let Malware Disguised as Messaging Apps in Store | Fortune
Vast Majority Of Android Devices Are Vulnerable To 'Stagefright' Exploit That Can Be Executed Via Text Message, According To Researchers
How have ARM TrustZone flaws affected Android encryption?
How did vulnerabilities in AirWatch Agent and Inbox work?
How does the boot mode vulnerability in Android work?
Mobile Data Loss: Threats and Countermeasures
Android Spyware: Google Removes 500 Apps Over Privacy Vulnerability
Researchers craft Android app that reveals menagerie of hidden spyware; legally barred from doing the same with iOS / Boing Boing
Critical Flaw in Major Android Tools Targets Developers and Reverse Engineers
Google Detects Android Spyware That Spies On WhatsApp, Skype Calls
'Janus' vulnerability allows attackers to modify APKs without changing signature, APKMirror already protected
Google just discovered a dangerous Android Spyware that went undetected for 3 Years
Android Flaw Lets Hackers Inject Malware Into Apps Without Altering Signatures
Password Stealing Apps With Over A Million Downloads Found On Google Play Store
Android Malware Will Destroy Your Phone. No Ifs and Buts About It
This New Android Malware Can Physically Damage Your Phone
'Loapi' mobile malware is five attacks rolled into one: Kaspersky | TheHill
A newly discovered strain of Android malware contains never-seen surveillance features / Boing Boing
How to Gain Complete Control of Any Android Phone with the AhMyth RAT « Null Byte :: WonderHowTo
How to Open a Backdoor in Android Devices - Hakin9 - IT Security Magazine
How to hack android device network using Network Spoofer - Coding Security
GitHub - dkhuuthe/MADLIRA: Malware detection using learning and information retrieval for Android
Peeping Inside Android Applications - Hakin9 - IT Security Magazine
What Is Juice Jacking? Can Charging My Phone In A Public Port Lead To Data Hack?
VirusTotal launches 'Droidy' sandbox to detect malicious Android apps
RAMpage Attack Explained—Exploiting RowHammer On Android Again!
GLitch: New 'Rowhammer' Attack Can Remotely Hijack Android Phones
Evil-Droid - Framework to Create, Generate & Embed APK Payloads - KitPloit - PenTest Tools for your Security Arsenal ☣
Exploiting Decades-Old Telephone Tech to Break Into Android Devices - Wired
Critical Flaw in Fortnite Android App Lets Hackers Install Malware

iOS

iOS_Jailbreaking

The Jailbreaking Community Is Bracing for Google to Publicly Drop an iPhone Exploit - Motherboard
Pangu Hackers have Jailbroken iOS 12 on Apple's New iPhone XS
The Life, Death, and Legacy of iPhone Jailbreaking - Motherboard
You Can Now Make $1.5 Million For Jailbreaking The iPhone - Motherboard
Want An iPhone Hacking Tool? Google Releases A Powerful Software
Google Researcher Releases iOS Exploit—Could Enable iOS 11 Jailbreak

New iPhone Passcode Bypass Hack Exposes Photos and Contacts
iOS 12.1 passcode bypass hack discovered just few hours after its release
NSA finally admits why it couldn't hack San Bernardino shooter's iPhone | ZDNet
Hackers Claim to Break Face ID a Week After iPhone X Release
Just one day after its release, iOS 11.1 hacked by security researchers | ZDNet
iPhone Apps With Camera Permissions Can Secretly Take Your Photos Without You Noticing
Apple’s latest security patch fixes a bug that lets hackers take over your phone via Wi-Fi - The Verge
Just one day after its release, iOS 11.1 hacked by security researchers | ZDNet
Face ID iPhone X 'hack' demoed live - BBC News
Google Researcher Publishes PoC Exploit for Apple iPhone Wi-Fi Chip Hack
Wallet-snatch hack: ApplePay 'vulnerable to attack', claim researchers • The Register
Zero-day iOS HomeKit vulnerability allowed remote access to smart accessories including locks, fix rolling out | 9to5Mac
Apple HomeKit flaw left smart gadgets vulnerable - BBC News
iPhone Bugs Are Too Valuable to Report to Apple - Motherboard
Security News This Week: Apple Patches a Very Bad iOS HomeKit Bug | WIRED
FBI Hacker Says Apple Are 'Jerks' and 'Evil Geniuses' for Encrypting iPhones - Motherboard
Apple’ iBoot Baseband Code for Various iPhone Models Leaked on GitHub
Secret code from the iPhone was posted to Github in the ‘biggest leak in history’ – BGR
Fuite d'iBoot : ce qui s'est réellement passé avec cette portion de code pour iPhone, des membres d'une communauté de débridage témoignent
Phone-Cracking Firm Found a Way to Unlock Any iPhone Model
Apple pushes back on hacker's iPhone passcode bypass report | ZDNet
USB Accessory Can Defeat iOS's New "USB Restricted Mode" Security Feature
The iPhone Wiki - definitive reference resources - jailbreak, firmwares details
Bootrom - The iPhone Wiki - apple SecureROM

Hacking_SIM_Cards

How a man hacked his victims' SIM cards to steal millions of dollars
How to Protect Your SIM Card and Phone Number - Motherboard

Mobile_Theft

lost-stolen-phone-what-to-do

Juice_Jacking

0-Days Found in iPhone X, Samsung Galaxy S9, Xiaomi Mi6 Phones
Credit Card Fraud Reported After People Purchased OnePlus Smartphones
Ethical Hacking: Hacking Mobile Platforms | Pluralsight
OnePlus Left A Backdoor That Allows Root Access Without Unlocking Bootloader
Mobile Pwn2Own: Hackers pwn iPhone, Huawei, Galaxy and Pixel Phone
Mobile Bootloaders From Top Manufacturers Found Vulnerable to Persistent Threats
Beware! Viral Sarahah App Secretly Steals Your Entire Contact List
How the Broadpwn Wi-Fi Vulnerability Impacted a Billion iPhones and Android Phones | WIRED
How the NSA Could Bug Your Powered-Off iPhone, and How to Stop Them | WIRED
All OnePlus Devices Vulnerable to Remote Attacks Due to 4 Unpatched Flaws
OnePlus denies checkout page hack amid credit card fraud reports
Hard-coded Password Lets Attackers Bypass Lenovo's Fingerprint Scanner
blackberry security issues - Google Search
How CIA Agents Covertly Steal Data From Hacked Smartphones (Without Internet)
Hackers Can Steal Your Passwords Just by Monitoring SmartPhone Sensors
Trolldi : l'application la plus sécurisée serait-elle celle qui n'a aucune ligne de code ? Un développeur partage ses astuces pour y arriver
Free Mobile Pentesting Lesson
Phone Numbers Were Never Meant as ID. Now We’re All At Risk | WIRED
root access - What is the difference between: Rooting, Jailbreak, ROM, Mod, etc.? Unlocking the bootloader - Rooting - Jailbreaking - ROM - NAND and Nandroid - Operating System - Mod (e.g. CyanogenMod) - Recovery (ClockworkMod, Amon Ra) - Custom Kernel (e.g. LeshaK's kernel) - Firmware - Driver - Over The Air (OTA) update - Fastboot - SIM unlocking - Flashing - SPL (Second Program Loader) - definitive answer - Android Enthusiasts Stack Exchange

Embedded_Systems-Hardware_and_IoT_Exploitation

Smartwatches_Pwning

MiSafes' child-tracking smartwatches are 'easy to hack' - BBC News

How open source hardware increases security | Opensource.com

Industrial_Environment_Attacks

IIoT_security

ReVuln Found 0day Vulnerabilities for SCADA Systems
PenTest: Pen Testing SCADA Architecture - Pentestmag
Industrial Control Systems' Cybersecurity: Bundle - 2 ebooks - Pentestmag
IEC 62443 Security Assurance Levels Explained
IEC 62443-4-1:2018 | IEC Webstore
A Four Step Guide to Secure Your ICS Network Using ISA 99/IEC 62443

Supply_Chain_Attack

Supply chain attack - Wikipedia

CPUs-Chips

Intel discloses another set of processor vulnerabilities
Sandsifter - The X86 Processor Fuzzer - KitPloit - PenTest Tools for your Security Arsenal ☣

Intel_Management_Engine_Vuln

PC vendors scramble as Intel announces vulnerability in firmware [Updated] | Ars Technica
Intel Management Engine Flaws Leave Millions of PCs Exposed | WIRED
Intel's super-secret Management Engine firmware now glimpsed, fingered via USB • The Register
System76 va désactiver Intel Management Engine de certains de ses ordinateurs portables Linux, après la découverte de vulnérabilités
Intel's Management Engine, a secure-computer-within-your-computer, is really, really insecure / Boing Boing
Researcher finds another security flaw in Intel management firmware [Updated] | Ars Technica
New Intel AMT Security Issue Lets Hackers Gain Full Control of Laptops in 30 Seconds
Positive Technologies - learn and secure : How to Hack a Turned-off Computer, or Running Unsigned Code in Intel ME

Meltdown-Spectre_Vulns

7 New Meltdown and Spectre-type CPU Flaws Affect Intel, AMD, ARM CPUs
​Linus Torvalds talks frankly about Intel security bugs | ZDNet
Major Linux distros have Meltdown patches, but that's only part of the fix | ZDNet
Spectre Patch Causes 'Significant Slowdown' On Older OS, Chips
Spectre-Meltdown-Checker - Spectre & Meltdown Vulnerability/Mitigation Checker For Linux - KitPloit - PenTest Tools for your Security Arsenal ☣
How to Check and Patch Meltdown CPU Vulnerability in Linux
Intel Warns Users Not to Install Its 'Faulty' Meltdown and Spectre Patches
How Much Slower Will My PC Become After Meltdown And Spectre Patches?
Is my PC vulnerable to Meltdown and Spectre? InSpectre tells you | PCWorld
Intel admits Spectre patch problems also affect newer Core chips
Intel reveals 0-25 percent performance impact from Meltdown and Spectre patches | PC Gamer
fossbytes.com | 522: Connection timed out
Intel's Never-Ending Spectre Saga Continues to Be a Hot Mess
New Windows patch disables Intel’s bad Spectre microcode fix | Ars Technica
google.fr/amp/s/www.engadget.com/amp/2018/01/28/intel-told-chinese-firms-of-meltdown-flaws-before-us/#ampshare=https://www.engadget.com/2018/01/28/intel-told-chinese-firms-of-meltdown-flaws-before-us/
Newly Discovered Variants Of Meltdown/Spectre Exploit Cache Coherency Across Cores
Linus Torvalds declares Intel fix for Meltdown/Spectre ‘COMPLETE AND UTTER GARBAGE’ | TechCrunch
Intel Releases New Spectre Patch Update for Skylake Processors
139 pieces of (seemingly nonfunctional) malware that exploit Spectre and Meltdown are now circulating in the wild / Boing Boing
139 Malware Samples Identified that Exploit Meltdown & Spectre Flaws
Hundreds Of Meltdown, Spectre Malware Samples Found In The Wild
Meltdown/Specter-based Malware Coming Soon to Devices Near You, Are You Ready?
Meltdown et Spectre : Intel abandonne le développement des mises à jour de microcodes pour certains processeurs, une décision qui ne surprend pas
MeltdownPrime and SpectrePrime: Researchers nail exploits
Microsoft's Meltdown Patch Made Windows 7 PCs More Insecure
Speculative execution - Eager/Predictive/Lazy Execution
After Meltdown and Spectre, Another Scary Chip Flaw Emerges | WIRED
Spectre/Meltdown : de nouvelles failles dans les processeurs, elles permettent de lire les registres internes, la mémoire kernel et celle de l'hôte
Warnings over fresh processor security flaws - BBC News
8 New Spectre-Class Vulnerabilities (Spectre-NG) Found in Intel CPUs
Eight new Spectre Variant Vulnerabilities for Intel Discovered - four of them critical
Two New Spectre-Class CPU Flaws Discovered—Intel Pays $100K Bounty - Hacking Bounty
Spectre bug protection forcing Chrome to use 10 to 13% more RAM
New Spectre 1.1 and Spectre 1.2 CPU Flaws Disclosed
Linux Kernel Developer Criticizes Intel's Meltdown Disclosure
Vulnerabilities Associated with CPU Speculative Execution - Wiki - VulWiki

Researchers find almost EVERY computer with an Intel Skylake and above CPU can be owned via USB
Intel Management Engine, Explained: The Tiny Computer Inside Your CPU
Critical Flaws in Intel Processors Leave Millions of PCs Vulnerable
Un malware utilise une fonction sournoise des processeurs Intel pour voler des données et éviter les pare-feu depuis presque dix ans
Rosenbridge - Hardware Backdoors In Some X86 CPUs - KitPloit - PenTest Tools for your Security Arsenal ☣

Cryptoprocessors-Secure_Enclaves

Secure cryptoprocessor - TMPs vs HSMs - Smartcards - Vulnerbailities, attacks - Full disk encryption, boot PIN, cold boot attack, data remanence, Wikipedia
Trusted Execution Environment (TEE) - definitive - REE Rich Execution Environment, Rich Android/Operating System - secure enclave - Trusted Applications - smartphones, mobiles
Trusted execution environment - TEE - Secure area of main processor, isolated execution environment - Premium Content Protection/DRM, authentication, secure modular programming - AMD Platform Security Processor PSP, AMD Secure Execution Environment, ARM TrustZone, Intel Trusted Execution Technology/SGX/Silent Lake, RISC-V MultiZone Security Trusted Execution Environment - enclave
hardware - What are the differences between HSM and SE? TPM - PKCS #11 - smartcard, sim, contactless - arm trustzone, sgx
Ldapwiki: Secure Enclave - Apple iOS - ARM TrustZone
Why Secure Enclave Is Winning Over The Security World - TEE
What Is the Secure Enclave? | Hacker News
Introduction to Trusted Execution Environment: ARM's TrustZone - TEE
Crypto-Bootloader (CryptoBSL) for MSP430FR59xx and MSP430FR69xx MCUs - Texas Instruments
Demystifying-The-Secure-Enclave-Processor
Towards an Open-Source Secure Enclave - Oasis Labs - Medium
Why Enclaves are Taking over the Security World - TEE, ARM’s TrustZone, AMD’s Secure Encrypted Virtualization (SEV), and Intel’s Trusted Execution Technology (TXT) and Software Guard Extensions (SGX).
Keystone | An Open Framework for Architecting TEEs - Trusted Execution Environments
Brief Introduction to Secure Cryptographic Enclaves
Demystifying the Secure Enclave Processor - iOS, SEPOS, Secure Enclave Processor SEP, exploitation
What Is Apple’s “Secure Enclave”, And How Does It Protect My iPhone or Mac?
Hacking in Darkness: Return-oriented Programming against Secure Enclaves - ROP

Flaws in Smart Irrigation Systems Expose Water Utilities to Botnet-Grade Attacks

Embedded_Boards_Hacking

RaspberryPi

opensource.com/article/17/3/iot-security-raspberry-pi?sc_cid=70160000001273HAAQ
Secure Kali Pi 2018 | Kali Linux
Single Board Computer SBC: Penetration Testing with Raspberry Pi (W42)

Firmwares_Attacks

Secure_Boot

SecureBoot - Debian Wiki
The whys and hows of secure boot - Embedded.com
SecureBoot/Testing - Debian Wiki
Page not found
SecureBoot - FreeBSD Wiki
Secureboot - Fedora Project Wiki
UEFI/SecureBoot/DKMS - Ubuntu Wiki
Secure Boot · Security-Onion-Solutions/security-onion Wiki · GitHub
Secure Boot - ArchWiki
UEFI/SecureBoot - Ubuntu Wiki
Secure boot and device encryption overview - Windows drivers | Microsoft Docs
High Assurance Boot - Variscite Wiki
hardware - Securing the bootloader - Information Security Stack Exchange
Notes on dual-booting Linux with BitLocker Device Encryption and Secure Boot | Ctrl blog
Secure Boot, Yay or Nay? : archlinux
SecureBootloadersST_RevA0 - SecureBootloadersST_RevA0.pdf
Take Control of Your PC with UEFI Secure Boot | Linux Journal
PureBoot, the High Security Boot Process – Purism
AN4581 - AN4581.pdf
Secure Boot - Funtoo
SecureBoot and Encryption
dm-crypt/Specialties - ArchWiki

Cybersecurity Researchers Spotted First-Ever UEFI Rootkit in the Wild
How to Update Your BIOS to Protect Against Vulnerabilities
Firmalware - Malware attacks on firmware - secure coding, bootstrap loader security, firmware update distribution security, encryption scheme for update distribution, encryption keys protection, lock bits -

Computer_Accessories

How to Secure your Wireless Mouse and Keyboard from being Hacked

Vehicles_Pwning

Car_Pwning

Hackers Can Steal a Tesla Model S in Seconds by Cloning Its Key Fob | WIRED
Researchers demonstrate how to unlock Tesla wireless key fobs in 2 seconds
Mercedes adds fingerprint support to its otherwise-terrible app
Tesla Model S Hack Could Let Thieves Clone Key Fobs to Steal Cars
Fast, Furious and Insecure: Passive Keyless Entry and Start in Modern Supercars | COSIC
Unpatchable Flaw in Modern Cars Allows Hackers to Disable Safety Features
Gone in Seconds: Hackers Steal Mercedes Car without Key
It’s 2017 and Hayes AT modem commands can hack luxury cars • The Register
Cybersecurity concerns may stop consumers from purchasing a connected car - Help Net Security
Watch thieves steal keyless Mercedes within 23 seconds
Chinese Hackers Find Over a Dozen Vulnerabilities in BMW Cars
BMW cars found to contain more than a dozen flaws - BBC News
Researchers find critical security flaws in popular car models
ECU tune and reverse engineering - firmware, embedded - hacking, analysis - Engine control unit - car hacking
The Car Hacker’s Handbook - A Guide for the Penetration Tester

Car Hackers Mess With Speedometers, Odometers, Alarms and Locks - Slashdot
Introductory to EEPROM (AEE101) - LSC - leading security products
A Deep Flaw in Your Car Lets Hackers Shut Down Safety Features | WIRED
eeprom register car at DuckDuckGo
How To Fight Odometer Fraud
Volkswagen CAN BUS Gaming | Hackaday.io
Car to Arduino Communication: CAN Bus Sniffing and Broadcasting With Arduino: 4 Steps
CAN Bus and OBD II Explained For Dummies, with Examples of how CAN Bus and OBD II Work!
a complete guide to hacking your vehicle bus on the cheap & easy – part 2 (interpreting the data) | theksmith
Since when is CAN bus mandatory for new vehicles? - Motor Vehicle Maintenance & Repair Stack Exchange
Hack Your Vehicle CAN-BUS With Arduino and Seeed CAN-BUS Shield: 6 Steps
Is it possible to change the odometer reading on a car mechanically? If not, what mechanisms are in place to prevent that from happening? - Quora
Blockchain a Solution to Prevent Odometer Tampering - BitCoin News
Is it possible to reverse/decrease the number of miles driven on a car? If yes, how? - Quora
How blockchain can help to prevent odometer fraud - IoTool
How Blockchain can help to prevent odometer fraud
Tractor-Hacking Farmers Are Leading a Revolt Against Big Tech's Repair Monopolies - Motherboard

Owning_Traffic_Devices

Hacking Traffic Lights is Amazingly Really Easy
Someone hacked this traffic sign with anti-Trump messages

Voting_Machines

I Bought Used Voting Machines on eBay for $100 Apiece. What I Found Was Alarming | WIRED
Voting Machines Are Still Absurdly At Risk | WIRED
Votes in 18 nations 'hacked' in last year - BBC News
Proof It's Possible to Hack German Elections; Hackers Tamper with Voting-Software
The US Should Modernize Election Systems to Prevent Hacking | WIRED
Hackers breach dozens of voting machines brought to conference | TheHill

Smart_Homes_Security

UK seeks to secure smart home gadgets - BBC News

Kodi

What is Kodi? Here is the online security guide for watching content with it
7 Security and Privacy Issues to Consider With a Kodi Media Box
3 Reasons Why You Should Be Using a VPN With Kodi
Kodi users on Windows and Linux infected with cryptomining malware - TechSpot
osmc security at DuckDuckGo
osmc vulnerabilities at DuckDuckGo

'Dolphin' attacks fool Amazon, Google voice assistants - BBC News
Researchers hack vacuum cleaner; turn it into perfect spying device
Bluetooth Hack Affects 20 Million Amazon Echo and Google Home Devices
Dojo brings critical security to smart home automation
Turning an Amazon Echo Into a Spy Device Only Took Some Clever Coding | WIRED
Snowden-Backed App 'Haven' Turns Your Phone Into a Home Security System | WIRED
How To Turn Your Android Device Into A Security Camera
Bookmarks Toolbar | Computer_Science | Cyber_security | Cyber-Security_and_Hacking_Learning | Web_Security | Platforms_Hacking | Kodi | kodi privacy at DuckDuckGo

HealthCare_Devices_Security

FDA Recalls Nearly Half a Million Pacemakers Over Hacking Fears
Hackers Can Remotely Access Syringe Infusion Pumps to Deliver Fatal Overdoses
Ethical hackers to boost NHS cyber-defences - BBC News

Nuclear_Equipment

Three Vendors Decline to Patch Vulnerabilities in Nuclear Radiation Monitors

Power-Energy_Grid_Hacking

DARPA's Hail Mary Plan to Restart a Hacked US Electric Grid | WIRED
People Are Recklessly Speculating That the Massachusetts Gas Explosions Were a Stuxnet-Related Hack - Motherboard
Critical Flaws Found in Solar Panels Could Shut Down Power Grids
Power firms alerted on hack attack scenarios - BBC News
Dangerous Malware Discovered that Can Take Down Electric Power Grids

Weapon_Hacking

Smart gun hacked with cheap magnet - BBC News

Printers

Hackers can conduct DoS attacks Using Flaw in Brother Printers
Remotely Exploitable Flaw Found In HP Enterprise Printers—Patch Now

Smart_Locks_And_Safes_Cracking

Faulty Firmware Auto-Update Breaks Hundreds of 'Smart Locks'
The “world’s worst” smart padlock – it’s EVEN WORSE than we thought – Naked Security
Smart lock can be hacked 'in seconds' - BBC News

CCTV-Security_Cameras_Attacks

how to scramble security cameras - Google Search
Two Popular IP Cameras Riddled With Vulnerabilities | Threatpost | The first stop for security news
This is How CIA Disables Security Cameras During Hollywood-Style Operations
Over 55,000 security camera DVRs are vulnerable to an exploit so simple it fits in a tweet – Boing Boing
Black Hat 2013 - Exploiting Network Surveillance Cameras Like a Hollywood Hacker - YouTube

Owning_Robots

Drones_Hacking

DJI Spark hijacking – Embedi

Gaming_Machines_Hacking

Playstation_4

Text Bomb Causing PS4 to Crash

Nintendo_Switch

Article · iDaN5x/Switcheroo Wiki · GitHub

PlayStation 4 hacked to run PS2 emulation & homebrew software
Hackers Get Linux Running On Switch And Claim Nintendo Can't Patch The Exploit - Nintendo Life
All Nintendo Switch Consoles Contain Unpatchable Chip-Level Flaw
Are video game consoles embedded systems? : embedded
PlayStation (video game console): What OS embedded in play station machine? - Quora

New Rapidly-Growing IoT Botnet Threatens to Take Down the Internet
Remotely Exploitable Flaw Puts Millions of Internet-Connected Devices at Risk
How to Detect BlueBorne Vulnerable Devices & What It Means « Null Byte :: WonderHowTo
Cisco: Most IoT projects are failing due to lack of experience and security | ZDNet
Homeland Security Hackers Remotely Hack Boeing 757
Connected toys have ‘worrying’ security issues - BBC News
Drone maker DJI in cyber-security row over bug bounty - BBC News
Is Government Regulation Needed to Improve Cyber-Security?
Security vs. convenience? IoT requires another level of thinking about risk | Ars Technica
How hackers can compromise your computer monitor
Smart Devices Can Be Hijacked to Track Your Body Movements And Activities Remotely
Hackers Could Easily Take Remote Control of Your Segway Hoverboards
Vulnerabilities in Pre-Installed Software expose Dell Systems to hackSecurity Affairs
Zero-Day Remote 'Root' Exploit Disclosed In AT&T DirecTV WVB Devices
IoT Radio Communication Attack – Part Two
Backdoor Account Removed from Western Digital NAS Hard Drives
Joykill: Previously Undisclosed Vulnerability Endangers User Data | Hackaday
A New Way to Track Down Bugs Could Help Save IoT | WIRED
Some Basic Rules for Securing Your IoT Stuff — Krebs on Security
Warnings over net-connected Christmas gadgets - BBC News
Microsoft's Project Sopris Could Secure the Next Generation of IoT | WIRED
Internet of Things Security (W35) - Pentestmag
raw.githubusercontent.com/pedrib/PoC/master/advisories/asuswrt-lan-rce.txt
Code-execution flaws threaten users of routers, Linux, and other OSes | Ars Technica
GitHub - evilsocket/bleah: A BLE scanner for "smart" devices hacking.
Cisco drops a mega-vulnerability alert for VPN devices | Ars Technica
That mega-vulnerability Cisco dropped is now under exploit | Ars Technica
Smart device security guidelines 'need more teeth' - BBC News
Microsoft built its own custom Linux OS to secure IoT devices
An Elaborate Hack Shows How Much Damage IoT Bugs Can Do | WIRED
A Long-Awaited IoT Crisis Is Here, and Many Devices Aren't Ready | WIRED
The Internet of Things Isn't Just About Networked Juicers | Privacy, Health, & Technology

Storages_Pwning

Hard_Disks_Hacking

Hard Disk Firmware Hacking (Part 1) - HDD

TV_Decoders_Set-Top-Boxes_Hacking

Unlock Startimes, Gotv, Digital TVs, Satellite Channels - Pay TV Hacking, decoder/set-top-box/décodeur - DTB firmware reversing/reverse engineering - flashing, upgrade, patching
[CB16] DVB-T Hacking by Amihai Neiderman - YouTube
Card sharing - hacking décodeurs TV, set top box/decoders - Pay Tv conditionnal access hacking

Banking-Financial-Payment_Systems_Security

Payment_Cards_Security

Fundamentals

EMV - Europay, Mastercard, and Visa - Wikipedia
Personal identification number - Wikipedia
What is card verification value (CVV)? - Definition from WhatIs.com
what can be done with card secret pin - Google Search
credit card - Is a 3 or 4 digit CVV enough for online transactions? - Information Security Stack Exchange
What do the numbers on my credit/debit card mean? - Personal Finance & Money Stack Exchange
what can be done with card secret pin - Google Search
what does Visa card mean - Google Search
hacking Visa pin - Google Search
EMV's TVR - Terminal verification results - Wikipedia

PCI_DSS_Standard

Payment Card Industry Data Security Standard - PCI-DSS - Wikipedia
ISO/IEC 7812 - Wikipedia

Contactless_Payment_Hacking

Contactless payment - Wikipedia
How safe is my contactless bank card? - Information Security Stack Exchange
authentication - NFC contactless payment security - Information Security Stack Exchange
How Secure Are Contactless Payments? - Infosecurity Magazine
(PDF) Security Issues with Contactless Bank Cards
NFC Contactless Payment – PCI / EMV Security Standards – Xorlogics
GitHub - blunden/EMVConsole: A python application for communicating with an EMV payment smart card
GitHub - blunden/TVRDecoder: Android app for decoding the TVR and TSI status codes found on many credit card reciepts

mitm attack against payment card verification at DuckDuckGo
How to Get Unlimited Free Trials Using a "Real" Fake Credit Card Number « Null Byte :: WonderHowTo
Forever 21 Warns Shoppers of Payment Card Breach at Some Stores
Credit card skimmers: How you can scam the skimmers - CNET
This Free App Can Protect You From Hidden Credit Card Skimmers
MasterCard launches Credit Card with Built-In Fingerprint Scanner
Whatever you do, don’t give this programmable payment card to your waiter | Ars Technica

Automatic_Teller_Machines

First ‘Jackpotting’ Attacks Hit U.S. ATMs — Krebs on Security

risks of communicating iban number at DuckDuckGo
Bankers Are Hiring Cyber-Security Experts to Help Get Deals Done - Bloomberg
New IcedID Banking Trojan Discovered
BankBot Returns On Play Store – A Never Ending Android Malware Story
Banking Trojan Gains Ability to Steal Facebook, Twitter and Gmail Accounts
Banks Around the World Hit with Repeated DDoS Attacks! « Null Byte :: WonderHowTo
You can now buy ATM malware on Dark Web for $5000
New Banking Malware Reverts To Ransomware When You Try To Remove It
Red Alert 2.0: New Android Banking Trojan for Sale on Hacking Forums
WannaCry-Stopping Hacker MalwareTech Charged With Helping Write Kronos Banking Trojan | WIRED
WannaCry Inspires Banking Trojan to Add Self-Spreading Ability
Dangerous Mobile Banking Trojan Gets 'Keylogger' to Steal Everything
Security Flaw Left Major Banking Apps Vulnerable to MiTM Attacks Over SSL
Hackers stole $800,000 from ATMs using Fileless Malware
NatWest bank spat prompts web security changes - BBC News
"I Just Pressed Shift Key 5 Times" — User Gains Full Access On A Windows XP ATM Machine
hackread.com/jackpotting-attacks-hits-us-atms-spit-out-cash-in-seconds/
"Wire bank transfer" malware phishing scam hits SWIFT banking system
Critical Oracle Micros POS Flaw Affects Over 300,000 Payment Systems
International Bank Account Number - Wikipedia
International Bank Account Number — Wikipédia
Virement à un nouveau bénéficiaire : pourquoi votre banque vous impose (encore) un délai ?

AI_Tools_And_Techniques

This is how artificial intelligence will become weaponized in future cyberattacks | ZDNet

Pwning_Artificial_Intelligence

Google bans birds on bikes from algorithm contest - BBC News
How Adversarial Attacks Work
Even Artificial Neural Networks Can Have Exploitable 'Backdoors' | WIRED
Self-Driving Cars Can Be Hacked By Just Putting Stickers On Street Signs
AI Has a Hallucination Problem That's Proving Tough to Fix | WIRED

Malware Detection in Executables Using Neural Networks | Parallel Forall
darkreading.com/threat-intelligence/ai-in-cybersecurity-where-we-stand-and-where-we-need-to-go/a/d-id/1330787
How Machine Learning And Other Tech Trends Will Disrupt Cyber Security In 2018
How artificial intelligence stopped an Emotet outbreak – Microsoft Secure
AI ripe for exploitation, experts warn - BBC News
PenTest: Machine Learning, Deep Learning and Cybersecurity - Pentestmag

Cryptocurrency-Blockchain_Security

Wallets

A 15-year-old said he discovered vulnerability in hardware wallet
John McAfee backed Bitfi wallet pwned again
Mixin Messenger - An open source cryptocurrency wallet with Signal messaging | Product Hunt
Storing bitcoins - securing wallets - Bitcoin Wiki

Bitcoin fanatics are storing their cryptocurrency passwords in DNA - CNET
Bitcoin Core Software Patches a Critical DDoS Attack Vulnerability

Cryptojacking

Shocking: Hackers using Googlebots in cryptomining malware attacks
Websites use your CPU to mine cryptocurrency even when you close your browser | Ars Technica
Cryptojacking Lets Strangers Mine Cryptocurrency With Your Browser | WIRED
Cryptocurrency Mining Scripts Now Run Even After You Close Your Browser
The Pirate Bay Caught Running Browser-Based Cryptocurrency Miner
Weeks Before WannaCry, Cryptocurrency Mining Botnet Was Using Windows SMB Exploit
Starbucks cafe's wi-fi made computers mine crypto-currency - BBC News
Hackers Targeting Servers Running Database Services for Mining Cryptocurrency
CoffeeMiner: Hacking WiFi to inject cryptocurrency miner to HTML requests - ArnauCode - Blog
securityaffairs.co/wordpress/67503/hacking/blackberry-mobile-website-hacked.html
Now even YouTube serves ads with CPU-draining cryptocurrency miners | Ars Technica
Ad Network Uses DGA Algorithm to Bypass Ad Blockers and Deploy In-Browser Miners
DDG, the second largest mining botnet targets Redis and OrientDB serversSecurity Affairs
Protect your site from Cryptojacking with CSP + SRI
MS Word Maybe Used for Cryptojacking Attacks
How to Defend Servers Against Cryptojacking
How To Block Cryptocurrency Mining In Your Web Browser
The Pirate Bay: We mine Monero from your CPU, install Adblocker or leave
how to make sure my pc isn't used for mining - Google Search
CoffeeMiner: Hacking WiFi to inject cryptocurrency miner to HTML requests - ArnauCode - Blog

Blockchains_Attacks

H9 W39 Attack and Defence in Blockchain Technologies - Online Course Intro on Vimeo
Gladius Shows Promise in Utilizing Blockchain Tech to Fight Hackers
Blockchain : une alternative sérieuse au couple identifiant/MdP ? Oui, selon certains experts
Blockchain for Identity: 6 Hot Projects - BankInfoSecurity
Bush Security Advisor Warns Against Blockchain Cold War - CoinDesk
Online Course: Attack and Defence in Blockchain Technologies (W39)
double spendibg attack Cryptocurrency at DuckDuckGo
https://duckduckgo.com/?q=51+percent+hashing+attack+on+blockchain&t=ffab&ia=web
https://duckduckgo.com/?q=51+percent+hashing+attack+wikipedia&t=ffab&ia=web
https://bitcoin.stackexchange.com/questions/658/what-can-an-attacker-with-51-of-hash-power-do
https://duckduckgo.com/?q=majority+attack+wikipedia&t=ffab&ia=news
https://en.bitcoin.it/wiki/Majority_attack
Flood attack - blockchain - Bitcoin Wiki
Double-spending - flaw in digital cash schemes - equivalent to the fiat counterfeit money - centralized vs decentralized - cryptocurrency/blockchain, bitcoin, PoW Proof of Work - Fundamental cryptographic techniques to prevent double-spending, while preserving anonymity in a transaction, are blind signatures and, particularly in offline systems, secret splitting - Majority/51% attack

Security vulnerabilities of cryptocurrency exchanges
Hacker Uses A Simple Trick to Steal $7 Million Worth of Ethereum Within 3 Minutes
A major vulnerability has frozen hundreds of millions of dollars of Ethereum | TechCrunch
Tether crypto-currency operator reports $31m raid - BBC News
Tether Hacked — Attacker Steals $31 Million of Digital Tokens
Tether Claims $30 Million in US Dollar Token Stolen - CoinDesk
Millions Gone? Broker Takes Fire for Bitcoin Cash Freeze - CoinDesk
Cryptographic vulnerabilities in IOTA – Neha Narula – Medium
Hacker Takes Over Coinhive DNS Server After Company Reuses Old Password
how to make sure my pc isn't used for mining - Google Search
Hackers Using Default SSH Creds to Take Over Ethereum Mining Equipment
Here’s How Hackers Can Hijack Your Online Bitcoin Wallets
GitHub - mit-dci/tangled-curl: IOTA's hash function curl is broken
How Hackers Cash Out Thousands of Bitcoins Received in Ransomware Attacks
Largest Cryptocurrency Exchange Hacked! Over $1 Million Worth Bitcoin and Ether Stolen
Lost Bitcoins: 4 Million Bitcoins Gone Forever Study Says | Fortune
A Piece of DNA Contained the Key to 1 Bitcoin and This Guy Cracked the Code - Motherboard
Bitcoin exchange Youbit shuts after second hack attack - BBC News
BlackWallet hacked: Hackers replace DNS server, steal $400k in Stellar
Tor-to-Web Proxy Caught Replacing Bitcoin Addresses on Ransomware Payment Sites
Scammers become the scammed: Ransomware payments diverted with Tor proxy trickery • The Register
A 200-Year-Old Idea Offers a New Way to Trace Stolen Bitcoins | WIRED

Quantum_Techniques_and_Tools

Laws of Physics Say Quantum Cryptography Is Unhackable. It's Not | WIRED
Quantum Computing Must Be a National Security Priority - Scientific American Blog Network
BlackBerry races ahead of security curve with quantum-resistant solution – TechCrunch
Countdown to the Crypto-Apocalypse - Motherboard
(in)Secure: Interview With Quantum Xchange’s John Prisco | Digital Trends
The Quantum Hacker Lab – Quantum Bits – Medium
Why the NSA moving away from Suite B cryptography due to quantum computers makes total sense
Why don’t post-quantum security standards exist yet?
Break RSA encryption with this one weird trick – Quantum Bits – Medium
Post-Quantum Cryptography at Google – Quantum Bits – Medium
Quantum cryptography - key exchange, quantum key distribution
How secure will our data be in the post-quantum era?
brute force combinatorics quantum computing at DuckDuckGo
Post-quantum cryptography - Wikipedia
cryptography - What kinds of encryption are _not_ breakable via Quantum Computers? post-quantum cryptography - In public key cryptography,three schemes are quantum-secure: Lattice based cryptography like NTRUEncrypt based on lattices, code-based cryptography like McEliece cryptosystem based on information theory, multivariate cryptography like Hidden Fields Equations - Information Security Stack Exchange
The Clock Is Ticking for Encryption | Computerworld
Quantum Computing vs Encryption: A Battle to Watch Out for
Quantum Computing vs. Conventional Cryptography - Strategic Finance
Provably secure and high-rate quantum key distribution with time-bin qudits | Science Advances
Quantum encryption is now fast enough for voice calls
High-speed quantum encryption may help secure future internet: study - Xinhua | English.news.cn
How Cryptographers Will ‘Fight Quantum With Quantum’ - Motherboard
Researchers Are Now Close To "Quantum Encrypted Internet"
Preparing for the Quantum Computing Future with Open-Source Software
Chinese satellite sends 'hack-proof' message - BBC News
High-speed quantum encryption may help secure the future internet
New nanomaterial, quantum encryption system could be ultimate defenses against hackers | KurzweilAI
Quantum Computing Is the Next Big Security Risk | WIRED
Quantum Video Call Displays the Future of Secure Communication
New quantum repeater paves the way for long-distance big quantum data transmission
Chinese satellite uses quantum cryptography for secure video conference between continents - MIT Technology Review
Forging a quantum leap in quantum communication
why will not quantum computing break symmetric encryption at DuckDuckGo
The quantum meltdown of encryption – TechCrunch
Quantum computers pose a security threat that we’re still totally unprepared for - MIT Technology Review

Secure_Software_Development-Secure_Coding

DevSecOps

5 ways DevSecOps changes security | Opensource.com
Why DevSecOps matters to IT leaders | The Enterprisers Project
CSCI 4971 - RPISEC Welcome
opensource.com/article/18/1/new-paradigm-cybersecurity
GitHub - devsecops/awesome-devsecops: An authoritative and definitive list of awesome devsecops tools with the help from community experiments and contributions.

SEI CERT C Coding Standard - security controls - secure coding - PDF version at resources.sei.cmu.edu/downloads/secure-coding/assets/sei-cert-c-coding-standard-2016-v01.pdf - Rules for Developing Safe, Reliable, and Secure Systems (2016 Edition)
Guidance to avoiding vulnerabilities in programming languages–Part 1: Language independent guidance - definitive high-level secure coding concepts
Programming Language Vulnerabilities - secure coding - C/C++, Python, Ada, Ruby - ISO/IEC JTC1/SC22/WG23
CWE - 2011 CWE/SANS Top 25 Most Dangerous Software Errors - Use of Hard-coded Credentials, key/password/credentials storage
Secure Software Development | Pluralsight
These five programming languages have flaws that expose apps to attack | ZDNet
Secure Programming HOWTO - Information on Creating Secure Software
Military Embedded Systems - cyberwarfare
Justifiably taboo: Avoiding malloc()/free() APIs in military/aerospace embedded code - Military Embedded Systems - secure coding - cyberwarfare - Stack-based algorithm: Allocate and rewind memory - The multithreaded, multicore allocation challenge
Secure programming with the OpenSSL API – secure coding
These are the most insecure programming languages | secure coding
CERT C Coding Standard - secure coding - The SEI CERT C Coding Standard is a software coding standard for the C programming language, developed by the CERT Coordination Center to improve the safety, reliability, and security of software systems - Guidelines in the CERT C Secure Coding Standard are cross-referenced with several other standards including Common Weakness Enumeration (CWE) entries and MISRA
Better Software Through Secure Coding Practices
SEI CERT C++ Coding Standard (2016 Edition) - sei-cert-cpp-coding-standard-2016-v01.pdf
The Secure Developer - Ep. #35, Secure Coding in C/C++ with Robert C. Seacord of NCC Group - YouTube
Secure Programming Practices in C++ - Patricia Aas - YouTube
CERT Secure Coding C and C++ - Robert C. Seacord
Secure coding - What is it all about? - GeeksforGeeks
Secrets | Python module to Generate secure random numbers - secure RNG, CSPRNG
SEI External Wiki Home - Secure Coding - SEI CERT C Coding Standard - SEI CERT C++ Coding Standard - SEI CERT Java Coding Standard - SEI CERT Android Coding Standard - SEI CERT Perl Coding Standard
New C++ Secure Coding Standard - Discussion on SEI CERT Secure Coding - wiki.sei.cmu.edu/confluence/ - unsigned integer overflow - select, poll
SEI CERT C++ Coding Standard - SEI CERT C++ Secure Coding Standard - PDF version at resources.sei.cmu.edu/downloads/secure-coding/assets/sei-cert-cpp-coding-standard-2016-v01.pdf
SDB:Secure coding checklist: C and C++ - openSUSE Wiki
How to Write a Secure Code in C/C++ Programming Languages - Pentestmag
Cybersecurity C and C++ Secure Coding - LAB.02.secure-coding.pdf
Secure code development in PHP (W49) - Hakin9 - IT Security Magazine - web security
Defensive Programming for Red Hat Enterprise Linux (and What To Do If Something Goes Wrong) - defprogramming.pdf - secure coding - safe programming - good practices in compilation
Definitions - SEI CERT C Coding Standard - jargon, terminology - definitive list - re entrancy, re entrant
CC. Undefined Behavior - SEI CERT C Coding Standard - definitive list - secure coding
Software Safety vs Security — code safety vs security - safe code/coding vs secure code/coding -
Secure Coding: A Practical Guide
Safe Coding Practices - secure coding
ISO-IECJTC1-SC22-WG23_N0870-tr24772-3-C-vulnerabilities-for-formal-editing-20190225 - ISO-IECJTC1-SC22-WG23_N0870-tr24772-3-C-vulnerabilities-for-formal-editing-20190225.pdf

Composing_pentesting_reports

The Art of Writing Penetration Test Reports
The Top 5 Penetration Testing Tools and Their Reporting Features
Reporting - OWASP
Report Template

Breaking_physical_locks

How to Pick a Lock - YouTube
Crack Any Master Combination Lock in 8 Tries or Less Using This Calculator « Null Byte :: WonderHowTo
How to Create a Bump Key to Open Any Door « Null Byte :: WonderHowTo
Lockpicking club · AnarchoTechNYC/meta Wiki · GitHub

Hacking_Challenges

Definitive list of awsome hacking/security resources - InfoSec · AnarchoTechNYC/meta Wiki - antifa - Vulnerable/hackable/pwnable/pen-testable targets - Hacking Labs - Hacking Challenges/Competitions, CTFs - Anti-Reversing/Reverse Engineering Techniques/Mitigation
Silicon Valley firms compete to hack R2-D2 - BBC News
Masquerade VM Walkthrough Part 1 | linkcabin
Malware-Traffic-Analysis.net - 2017-12-15 - Traffic analysis exercise - Two pcaps, two emails, two mysteries!
How to solve the Malwarebytes CrackMe: a step-by-step tutorial | Malwarebytes Labs
Digital fight training · AnarchoTechNYC/meta Wiki
Hack the Depth VM (CTF Challenge)
Updated Hacking Challenge Site Links
Solving the White Rabbit CrackMe – Alex Skalozub – Medium
[PentesterLab] Our exercises
Exploit Exercises
GitHub - RPISEC/HackTheVote: Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote
Capture the Flag: It's a game for hack...I mean security professionals
CTFtime.org / All about CTF (Capture The Flag)
GitHub - facebook/fbctf: Platform to host Capture the Flag competitions
Capture the Flag
picoCTF - CMU Cybersecurity Competition
GitHub - RomaniukVadim/wargaming-challenges: Wargaming challenges write-ups
Hack.me · The house of rising sandbox

Hacking_Bounties

Steam bug allowed unlimited free downloads - BBC News
Coinbase, EOS, and Stellar Pay Out $60k in Bug Bounties to White Hat Hackers This Week Alone • Live Bitcoin News

Bounty_Targets

Stripe - Online payment processing for internet businesses | France
Facebook Broadens Its Bug Bounty to Include Third-Party Apps | WIRED
Parse + Open Source = ❤️
Presentation Software | Online Presentation Tools | Prezi
Yahoo
Deutsche Telekom: Deutsche Telekom: Home
Bug Bounty - IDA Pro HexRay
Get paid up to $40,000 for finding ways to hack Facebook or Instagram accounts - Hacking Bounty

Researcher Resources - How to become a Bug/Hacking Bounty Hunter - Security Research - definitive resources/forums/tutorials list

Refs

Bug/Hacking Bounty Toolkit – BugBountyHunting – Medium
Bug/Hacking Bounty Programs: A Quick Guide – Threat Intel – Medium
Bug Bounty, Vulnerability Coordination - HackerOne
Zopim: Bug Bounty Program - Get Rewards through HackerOne
Crowdfense
Top 30 Bug/Hacking Bounty Programs in 2018
Welcome to Web Application Security Research: List of Bug/Hacking Bounty Programs

White Hat Hacking: Hack the Pentagon? « Null Byte :: WonderHowTo
Hackers are making big bucks working for the good guys | New York Post
Get $1M for reporting zero-day flaws in Tor to "help Govt fight crime"
Zerodium Offers $1 Million for Tor Browser 0-Days That It will Resell to Governments - Hacking Bounty
Samsung Launches Bug Bounty Program — Offering up to $200,000 in Rewards
A Company Offers $500,000 For Secure Messaging Apps Zero-Day Exploits - Hacking Bounty
A superstar Chinese hacker just won $112,000 from Google, its largest bug bounty ever
Chromebook exploit earns researcher second $100k bounty – Naked Security
#BugBounty — “I don’t need your current password to login into your account” - How could I…
Reflected Client XSS Amazon.com – Jonathan Bouman – Medium
Rewards of Up to $500,000 Offered for FreeBSD, OpenBSD, NetBSD, Linux Zero-Days
Shadowy Hackers Accidentally Reveal Two Zero-Days to Security Researchers
Facebook Offering $40,000 Bounty If You Find Evidence Of Data Leaks
Unpatched Remote Code Execution in Reprise License Manager
Intel Corporation - Bug Bounty Program | HackerOne
The Department of Defense's Bug Bounty Program Has Flagged Thousands of Vulnerabilities
Zero Day Initiative - hacking bounty platform
ZERODIUM - The Leading Exploit Acquisition Platform - hacking bounty platform
intigriti - ethical hacking and managed bug bounty platform
ARK Development and Security/Hacking Bounty Program
GitHub - streaak/keyhacks: Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
Microsoft launches Azure DevOps bug bounty program, $20,000 rewards on offer
Microsoft Offers $100,000 Bounty for Finding Bugs in Its Identity Services
Tesla's software bug bounty is going to the big leagues with Pwn2Own - Roadshow
EdOverflow | “CI Knew There Would Be Bugs Here” — Exploring Continuous Integration Services as a Bug Bounty Hunter
Bug bounty: Hack Tesla Model 3 to win your own Model 3
19-year-old makes millions from ethical hacking - bug bounty, csrf, idors | ZDNet
Drone maker DJI in cyber-security row over bug bounty - BBC News
Facebook Bug Bounty Program Makes Biggest Reward Payout Yet | WIRED
Yet another talk on bug bounty
Get SSH username & Password For Any Server easily with Brute Force Attack – bug bounty hunting
EP3: How to be a paid bug bounty hunter (EN) - YouTube
Facebook Bug Bounty Guide | API testing - YouTube
Bug Bounty Hunting Methodology v2 - Jason Haddix from Bugcrowd's LevelUp 2017 - YouTube
Bug Bounty 101 - How To Become A Bug Hunter - Bug Bounty Talks - YouTube
About a Sucuri RCE...and How Not to Handle Bug Bounty Reports - RCE Security
Singapore government to run another bug bounty | ZDNet
Home | Hacker101 - Capture the Flags - challenges
Bug bounty is a joke - phwd - Medium
Getting Paid for Breaking Things: The Fundamentals of Bug Bounty
Payouts: what's a bug actually worth these days? - Starter Zone - Bugcrowd Forum
Payouts: what's a bug actually worth these days? - Starter Zone - Bugcrowd Forum
Payouts: what's a bug actually worth these days? - Starter Zone - Bugcrowd Forum

Interviews_Questions

Top 50 Information Security Interview Questions [Updated for 2017]

Reverse Engineering challenges
The Cryptopals Crypto Challenges
[Write-up] Mr Robot - Christophe Tafani-Dereeper
Wargame (hacking) - Wikipedia
OverTheWire: Wargames
io.netgarage.org
RPISEC - Bit Tripping: Blackbox: A Cryptography Wargame
SmashTheStack Wargaming Network
UCR CS165 - Reverse Engineering Challenges
Root Me : Hacking and Information Security learning platform] - hacking challenges resolving
crackme - Crack Me Material - challenges - Reverse Engineering Stack Exchange
sploitF-U-N - writeups, challenges, CTFs
Techorganic – Hacking challenges, writeups, CTFs
DEFINITIVE - Tools and resources to prepare for CTFs. – CTF for noobs - disassemblers, debuggers, reverse engineering - hacking challenges
CTF for noobs - definitive resources, writeups for hacking challenges
DEFINITIVE - CTFs, Hacking challenges preparation - malware analysis

Actual_Hacks

Famous_Hacks-Malware_Outbreaks

Attacks-Malware_Outbreaks

Torii_2018

New Iot Botnet Torii Uses Six Methods for Persistence, Has No Clear Purpose

Stuxnet_Hack-2003

Stuxnet - Wikipedia
What the Heck Was Stuxnet!? « Null Byte :: WonderHowTo
Mirai Variant 'OMG' Turns IoT Devices into Proxy Servers for Cryptomining
stuxnet natanz profinet - Google Search

HNS_Botnet-2018

New HNS botnet has already compromised more than 20,000 IoT devices - Security AffairsSecurity Affairs
HNS Evolves From IoT to Cross-Platform Botnet

Night_Dragon_Operation-2006

Night Dragon Operation - Wikipedia
Night Dragon | Intel Security

Operation_Aurora-2010

Operation Aurora - Wikipedia

Shamoon-2012

Shamoon wiper malware returns with a vengeance | Ars Technica

Wannacry-2017

Hackers Behind WannaCry Ransomware Withdraw $143,000 From Bitcoin Wallets
An NSA-derived ransomware worm is shutting down computers worldwide | Ars Technica
WannaCry Kill-Switch(ed)? It’s Not Over! WannaCry 2.0 Ransomware Arrives
WannaCry Ransomware That's Hitting World Right Now Uses NSA Windows Exploit
Google Researcher Finds Link Between WannaCry Attacks and North Korea
WannaCry Ransomware Decryption Tool Released; Unlock Files Without Paying Ransom
Coding mistakes in WannaCry Ransomware may let you get your files back » TechWorm
Cyber-attack: US and UK blame North Korea for WannaCry - BBC News
North Korean Cyber-Attacks and Collateral Damage | AlienVault
wannacry-hero-marcus-hutchins-new-legal-woes-white-hat-hackers

NotPetya_2017

The Untold Story of NotPetya, the Most Devastating Cyberattack in History
The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED
New TeleBots backdoor links Industroyer to NotPetya for first time
Ukranian company that spread Petya could face criminal charges for vulnerability - The Verge
How hackers are targeting the shipping industry - BBC News
Hackers Linked to NotPetya Ransomware Decrypted a File for Us - Motherboard
Latest malware attack exposes cybersecurity weaknesses | TheHill
Tuesday’s massive ransomware outbreak was, in fact, something much worse | Ars Technica
Global ransomware attack causes turmoil - BBC News
NotPetya attack: Maersk reinstalled 45,000 PCs, 2,500 apps & 4,000 servers
UK and US blame Russia for 'malicious' NotPetya cyber-attack - BBC News

Bad_Rabbit-2017

EternalRomance NSA Exploit a Key Player in Bad Rabbit Ransomware Mayhem
Small Amount of Bad Rabbit Ransomware Victims Detected in the USA

Mirai_Botnet-2017

Hackers behind Mirai botnet to avoid jail for working with the FBI
The Mirai Botnet Architects Are Now Fighting Crime With the FBI | WIRED
Two Hackers Plead Guilty to Creating IoT-based Mirai DDoS Botnet
Three men plead guilty to creating Mirai botnet [Updated] | Ars Technica
Botnet Creators Who Took Down the Internet Plead Guilty
Botnet hackers that caused huge Internet blackout did it for money, revenge
Mirai botnet: Three admit creating and running attack tool - BBC News
Hackers behind Mirai botnet & DYN DDoS attacks plead guilty
The Mirai Botnet Was Part of a College Student Minecraft Scheme | WIRED
The latest IoT botnet displays evidence of a halfway clever botmaster / Boing Boing
A new Mirai-style botnet is targeting the financial sector | ZDNet

Triton-2017

Russia Linked to Triton Industrial Control Malware | WIRED
Russia launched Triton malware to sabotage Saudi petrochemical plant
Hackers shut down plant by targeting its safety system
Hackers Deploy Triton Malware to Shut Down Power Station
TRITON Malware Targeting Critical Infrastructure Could Cause Physical Damage
Triton Malware Targets Industrial Safety Systems In the Middle East | WIRED

Satori_Botnet-2018

A potent botnet is exploiting a critical router bug that may never be fixed | Ars Technica

OMG_Botnet-2018

OMG! Mirai Variant Creates Proxy Servers - Infosecurity Magazine

Smominru_Botnet-2018

Mining Smominru botnet used NSA exploit to infect more than 526,000 systemsSecurity Affairs
Botnet Infects Half a Million Servers to Mine Thousands of Monero - CoinDesk

WannaMine-2018

WannaMine, the sophisticated crypto miner that spreads via NSA EternalBlue exploitSecurity Affairs

DoubleDoor-2018

New IoT Botnet DoubleDoor Bypass Firewall to Drop Backdoor

The global ransomware attack weaponized software updates - The Verge
World's Biggest Botnet Just Sent 12.5 Million Emails With Scarab Ransomware
Top 18 Most Dangerous Computer Viruses Of All Time
Here’s why the epidemic of malicious ads grew so much worse last year | Ars Technica
New IoT botnet offers DDoSes of once-unimaginable sizes for $20 | Ars Technica

Memcached_DDOS-2018

Google, PlayStation & NRA suffered DDoS attacks via Memcached servers
1.7 Tbps DDoS Attack — ​Memcached UDP Reflections Set New Record
Over 15,000 Memcached DDoS Attacks Hit 7,100 Sites in Last 10 Days

Slingshot_APT-2018

APT Hackers Infect Routers to Covertly Implant Slingshot Spying Malware

VPNFilter-2018

VPNFilter Router Malware Adds 7 New Network Exploitation Modules
Destructive and MiTM Capabilities of VPNFilter Malware Revealed
USA : le FBI publie une méthode pour contrecarrer le maliciel « VPN Filter », qui aurait été utilisé pour pirater plus de 500 000 routeurs
Le malware VPNFilter, utilisé pour pirater plus de 500 000 routeurs, est plus sophistiqué que ne laissaient penser les premières analyses
Cisco's Talos Intelligence Group Blog: New VPNFilter malware targets at least 500K networking devices worldwide
Defending Against the New VPNFilter Botnet
Stealthy, Destructive Malware Infects Half a Million Routers | WIRED

A serious security vulnerability has been found in 7-Zip | PC Gamer

Breached_Organizations

Facebook-2018

Hack Brief: Someone Posted Private Facebook Messages From 81,000 Accounts
How to Check If Your Facebook Account Got Hacked—And How Badly | WIRED
30M Facebook breach; includes users phone numbers and location data
How Facebook Hackers Compromised 30 Million Accounts | WIRED
Facebook Hacked, 50 Million Users Affected - Motherboard
30 Million Facebook Accounts Were Hacked: Check If You're One of Them
The Facebook Hack Is an Internet-Wide Failure | WIRED
Hackers Stole 50 Million Facebook Users' Access Tokens Using Zero-Day Flaw
Facebook's Massive Security Breach: Everything We Know | WIRED
Facebook Hacked — 10 Important Updates You Need To Know About
The Facebook Security Meltdown Exposes Way More Sites Than Facebook | WIRED

Hackers disrupt UK's Bristol Airport flight info screens after ransomware attack

NewEgg_2018

Hackers target Newegg with "sophisticated malware"; steal credit card data

British_Airways-2018

British Airways: Suspect code that hacked fliers 'found' - BBC News
How Hackers Slipped by British Airways' Data Defenses | WIRED
British Airways Hacked – 380,000 Payment Cards Compromised
The British Airways Breach: How Magecart Claimed 380,000 Victims

Apple-2018

A 16-year-old hacked Apple and stole 90GB of secure files – BGR

Reddit-2018

Reddit Got Hacked Thanks to a Woefully Insecure Two-Factor Setup | WIRED
Reddit hacked: Hackers steal complete copy of old database backup

HBGary-2011

HBGary - Wikipedia
HBGary Federal Hacked by Anonymous — Krebs on Security

Yahoo-2014

22-Year-Old Hacker Pleads Guilty to 2014 Yahoo Hack, Admits Helping Russian Intelligence

Imgur_2014

Imgur—Popular Image Sharing Site Was Hacked In 2014; Passwords Compromised
Imgur confirms 1.7 million users hit by data breach - BBC News

Sony_Hack-2014

Advice from a Real Hacker: Why I'm Skeptical That North Korea Hacked Sony - Sony Hack « Null Byte :: WonderHowTo
The Sony Hack: Thoughts & Observations from a Real Hacker_Sony_Hack « Null Byte :: WonderHowTo

Uber_2016

UK regulator has 'huge concerns' over Uber breach - BBC News
After Getting Hacked, Uber Paid Hackers $100,000 to Keep Data Breach Secret
www.google.com
Uber Paid Hackers $100,000 to Cover Up a Breach Impacting 57 Million Customers - Motherboard
Hackers hit Uber in 2016: data on 57 million riders, drivers stolen | Ars Technica
Uber Paid 20-Year-Old Florida Hacker $100,000 to Keep Data Breach Secret
Uber used bug bounty program to launder blackmail payment to hacker | Ars Technica

PayPal-2017

PayPal Subsidiary Data Breach Hits Up to 1.6 Million Customers

Deloitte-2017

Security News This Week: The Deloitte Breach Was Worse Than We Thought | WIRED
Deloitte Hacked — Cyber Attack Exposes Clients' Emails

HBO_Hack-2017

Iranian charged with Game of Thrones hack - BBC News
Hackers threaten to leaks new 'Game Of Thrones' episodes 'as soon as possible'

DocuSign-2017

DocuSign Data Breach Led to Targeted Email Malware Campaign

Dallas_Emergency_System-2017

Here's How Hacker Activated All Dallas Emergency Sirens On Friday Night

Youbit-2017

Youbit Bitcoin exchange quits operation after 2 hacks in 8 months

EtherDelta-2017

EtherDelta’s DNS Hacked, Website Replaced With Hacker’s Duplicate to Steal Funds – The Merkle
EtherDelta cryptocurrency exchange hacked in fake website scam

Alterix-2017

Equifax_Hack-2017

Equifax's CEO isn't sure whether they've finally started encrypting their servers yet / Boing Boing
Equifax data breach may affect up to 143 million people - CNET
Equifax Data Breach: Steps You should Take to Protect Yourself
Equifax Deserves the Corporate Death Penalty | WIRED
How to Protect Yourself from the Equifax Hack!
Equifax data breach: Credit rating firm replaces key staff - BBC News
Fake website fools Equifax staff - BBC News
Equifax blames open-source software for its record-breaking security breach: Report | ZDNet
The hackers who broke into Equifax exploited a flaw in open-source server software — Quartz
Equifax says more private data was stolen in 2017 breach than first revealed | ZDNet
Equifax finds more victims of 2017 breach - BBC News

Fox_IT-2017

Hackers take control of security firm’s domain, steal secret data | Ars Technica

Nissan-2017

Nissan Finance Canada Suffers Data Breach — Notifies 1.13 Million Customers

SEC Discloses Hackers Broke Into Edgar Corporate Filing System Last Year
Sony PlayStation Social Media Accounts Hacked; Claims PSN Database Breach
Security firm was front for advanced Chinese hacking operation, Feds say | Ars Technica
Web Hosting Company Pays $1 Million to Ransomware Hackers to Get Files Back
App maker's code stolen in malware attack - BBC News
Phishing Scam: Hackers Steal $150,000 in Ethereum from Experty ICO
Hospital Pays $55K Ransomware Demand Despite Having Backups

Coincheck-2018

Someone Stole Almost Half a BILLION Dollars from Japanese Cryptocurrency Exchange

Hacker erase 1 terabyte of data from spyware developers server

TMobile-2018

‘I Lived a Nightmare:’ SIM Hijacking Victims Share Their Stories - Motherboard
'Critical' T-Mobile Bug Allowed Hackers To Hijack Users' Accounts - Motherboard

WinterOlympics-2018

Russia hacked Winter Olympics & framed N.Korea in false-flag attack: US
Cyber Attack Disrupts Winter Olympics Website During Opening Ceremony

GitHub-2018

A 1.3Tbs DDoS Hit GitHub, the Largest Yet Recorded - memcached| WIRED
How GitHub braved the world's largest DDoS attack - memcached
GitHub survives massive DDoS attack relatively unscathed - memcached
In Wake of 'Biggest-Ever' DDoS Attack, Experts Say Brace For More | Threatpost | The first stop for security news
World’s largest DDoS attack thwarted in minutes – Naked Security

Facebook bug exposed private posts of 14 million users to public
Ransomware hits Atlanta police dashcam footage - BBC News
IoT : des pirates s'appuient sur le thermostat connecté d'un aquarium pour pénétrer le réseau d'un casino et extirper 10 Go de data
Hackers attack Casino’s fish tank thermometer to obtain sensitive data
Worse than Equifax: Personal records of 340M people leaked online

A Brief History of Hacking « Null Byte :: WonderHowTo
The 10 biggest hacks, breaches, and security stories of 2016 | PCWorld
Some of the World's Most Notorious Hackers Got Hacked « Null Byte :: WonderHowTo
Stuxnet-like 'Havex' Malware Strikes European SCADA Systems
Passwords For 540,000 Car Tracking Devices Leaked Online
CCleaner Backdoor Attack: A State-sponsored Espionage Campaign
Ransomworm: The birth of a monster - Help Net Security
Andromeda botnet dismantled in international cyber operation - Help Net Security
Young Hacker, Who Took Over Jail Network to Get Friend Released Early, Faces Prison
MailSploit — Email Spoofing Flaw Affects Over 30 Popular Email Clients
New Mirai Botnet Variant Found Targeting ZyXEL Devices In Argentina
U.S. Charges Three Chinese Hackers for Hacking Siemens, Trimble & Moody
Oxford and Cambridge club members face hard disk theft - BBC News
Ransomware Attack Involving Scarab Malware Sends Over 12M Emails in 6 Hours
How Shipping Giant Maersk Dealt With a Malware Meltdown, And Other Security News This Week | WIRED
Man hacks prison computers & alters records for pal's early release
The Biggest Cybersecurity Disasters of 2017 So Far | WIRED
Here's How Hacker Activated All Dallas Emergency Sirens On Friday Night
Webroot deletes Windows files and causes serious problems for users | InfoWorld
Ransom Fail: Hackers Leak Thousands of Naked Photos of Plastic Surgery Patients
A Trove of 1.4 Billion Clear Text Credentials File Found on Dark Web
Feds Seize Over 20,500 Domain Names For Selling Counterfeit Products
Newly Uncovered 'MoneyTaker' Hacker Group Stole Millions from U.S. & Russian Banks
Hackers steal 19M California voter records after holding database for ransom
Researchers Find Trove of 1.4 Billion Breached Credentials - Infosecurity Magazine
Lenovo removes backdoor present in networking switches since 2004
Police give out infected USBs as prizes in cybersecurity quiz – Naked Security
Flight Sim Lab installed Chrome passwords stealer in piracy check tool
To hack Australia and learn its secrets, buy second-hand furniture • The Register
Developer gets prison after admitting backdoor was made for malice | Ars Technica
A Hacker Has Wiped a Spyware Company’s Servers—Again - Motherboard
Uncovered: Cyber Espionage Using Fake Apps with Android Malware - CPO Magazine
PSA: Improperly Secured Linux Servers Targeted with Chaos Backdoor
À cause d'une ligne de code, des milliers de personnes se sont retrouvées dans des prisons en Turquie ! Le cauchemar de la nation est numérique
Hacker Who Never Hacked Anyone Gets 33-Month Prison Sentence
Sauron's Spies Are Everywhere — Even on Computers | HowStuffWorks
An Exploit Left Millions of Steam Users Vulnerable for the Past 10 Years - Motherboard
Man whose DDoS attacks took down entire country's Internet jailed - Mirai botnet
Scraping the Web with Nutch for Elasticsearch - Local search engine
Apache Solr - Ref Guide

Hacking_Groups

Non-Governmental_Groups

Shadow_Brokers

The Shadow Brokers - Wikipedia
Shadow Brokers Gets Results! Congress Finally Moves to Oversee Vulnerabilities Equities Process – emptywheel

Dark_Overlord

Suspected member of The Dark Overlord hacking group arrested

Equation_Group

Equation Group - Wikipedia

SowBug

Newly Uncovered 'SowBug' Cyber-Espionage Group Stealing Diplomatic Secrets Since 2015

Group123

An Adobe Flash 0day is being actively exploited in the wild | Ars Technica

LulzSec

LulzSec - Wikipedia

TeaMp0isoN

TeaMp0isoN - Wikipedia

List of hacker groups - Wikipedia
Poor coding limits IS hackers' cyber-capabilities, says researcher - BBC News
Dragonfly 2.0: Hacking Group Infiltrated European and US Power Facilities
Romanian Police Arrest 5 People for Spreading CTB Locker and Cerber Ransomware

Fin7

Fin7: The Billion-Dollar Hacking Group Behind a String of Big Breaches | WIRED

Individual_Hackers

List of hackers - Wikipedia
List of computer criminals - Wikipedia
AT&T Hacker ‘Weev’ Sentenced to 3.5 Years in Prison | WIRED
Johnny Long - Wikipedia
Max Butler - Wikipedia
Record 13-Year Sentence for Hacker Max Vision | WIRED

Hacking Groups - MITRE ATT&CK™
Fin7: The Billion-Dollar Hacking Group Behind a String of Big Breaches | WIRED
Three Arrests Made in Largest Hack in Lebanon's History

Cybersecurity_Awareness_And_Sensibilisation

How to give your parents the security talk this Thanksgiving - CNET
Building an Information Security Awareness Program in 5 Easy Steps
Smart behaviors that can improve your cybersecurity
The Motherboard Guide to Not Getting Hacked - Motherboard
How Hacking Works - Motherboard
5 Simple Tricks To Stop Hackers
After Yahoo and Equifax hacks, cybersecurity goes mainstream - CNET
How hackers can save lives? – tbmnull – Medium
The Cyber Security Hub™ on LinkedIn: "10 Steps To Cyber Security - Infographic via UK's National Cyber Security Centre (NCSC)"

Company-Wise

What breaks our systems: A taxonomy of black swans | Opensource.com
Managing Insider Threats with Internal Monitoring
NIST, CIS/SANS 20, ISO 27001: What's the difference?
No One Can Get Cybersecurity Disclosure Just Right | WIRED
Information Security Controls: Frequently Asked Questions (FAQ)
Penetration Testing vs. Red Teaming: PCI Edition | Tim MalcomVetter | LinkedIn
ISO 27001 Lead Implementer Online Course | Advisera eTraining
R.I.P. root9B? We Hardly Knew Ya! — Krebs on Security
Top 10 companies hiring cybersecurity professionals - TechRepublic
10 Top Cybersecurity Companies | Investing News Network
Linux creator Linus Torvalds: This is what drives me nuts about IT security | ZDNet
5 Questions to ask from client before penetration testing engagement
How To Remotely Access Another Computer From Your Computer
Security pros at hacker conference: Be more boring | TheHill
Protect and defend
Security Think Tank: 10 control areas to mitigate against malware attacks
How your company needs to train workers in cybersecurity | Computerworld
Don't Forget Basic Security Measures, Experts Say
Virtual and Augmented Reality: Transforming The Way We Look At The Internet and Data Security
Ransomware: A cheat sheet for professionals - TechRepublic
10 conseils pour la sécurité de votre système d’information | CNIL
A new approach to security instrumentation | Opensource.com
6 Tips to Protect Your Online Business from Cyber Attacks
Corporate Cybersecurity Lone Rangers Do Not Exist | Wayne Fischer | Pulse | LinkedIn
Jigsaw (company) - technology incubator created by Google - Investor in Arbor Networks DigitalAttackMap - Wikipedia

General_Resources

Google Project Zero

Exploit-Malwares-Security_Tools_Resources

Exploits Database by Offensive Security
KitPloit - PenTest Tools for your Security Arsenal ☣
Gotowebsecurity For Internet Security Tips | Mobile Phone Security Tips
Ethical Hacking Archives - websecurity
0x09AL (Rio) · GitHub
Fantastic Malware and Where to Find Them – Megabeets
DanMcInerney (Dan McInerney) · GitHub
Ice3man543 (Nizamul Rana) · GitHub
Research
urbanadventurer (Andrew Horton) · GitHub
Smaash · GitHub
Kellgon - The Hacker Tutorial - Tools
t0kx · GitHub
christophetd (Christophe Tafani-Dereeper) · GitHub
m0rtem ( MortySec) · GitHub
HatBashBR · GitHub
ToolWar | Information Security (InfoSec) Tools
GitHub - Cryptogenic/Exploit-Writeups: A collection where my current and future writeups for exploits/CTF will go
Malware Sources - PenTestIT
JonathanSalwan (Jonathan Salwan) · GitHub
Appendix A: Testing Tools - OWASP

Articles_Ref_List

SEED Project
GitHub - enaqx/awesome-pentest: A collection of awesome penetration testing resources, tools and other shiny things
professional education - Books about Penetration Testing - Information Security Stack Exchange
9 Books to follow if you want to become a ethical hacker - Coding Security
GitHub - infoslack/awesome-web-hacking: A list of web application security
Favorite conference talks · AnarchoTechNYC/meta Wiki
100+ Best Hacking Books Free Download In PDF 2017
The Top Cyber Security Blogs and Websites of 2018
Light Blue Touchpaper | Security Research, Computer Laboratory, University of Cambridge
9 Popular Training Courses to Learn Ethical Hacking Online
Introduction to Computer and Network Security
Computer Security
Welcome to Hellbound Hackers - Hacking Forum - Tutorials, articles - Challenges
OWASP Testing Guide Appendix B: Suggested Reading - OWASP
MalwareTech - Life of a Malware Analyst

Projects – Security – opensource.google.com
Deceptive Security – An offensive security blog
HOME - Black Hills Information Security
LiveOverflow - LiveOverflow
Google Online Security Blog
Cybrary - Online Cyber Security Training, Free, Forever
awesome-infosec/readme.md at master · onlurking/awesome-infosec - hacking labs, pen-testable targets - secure coding - trusted computing - cellular network security - smart cards - BIOS, SMM, UEFI - Cryptography - competitions, CTFs, hacking challenges - honeypots - definitive list of awsome hacking/security tools - UNIX/Linux Capabilities, least privilege principle - Android rooting hacking lab
http://www.hackers-arise.com/
OWASP
Exploit Database - Archived Security Papers
0x00sec - The Home of the Hacker
Avatao
Learn Ethical Hacking and Penetration Testing Online
Kellgon - The Hacker Tutorial
Hacking Archives - Develope IT
Pentest Armoury | Information Security Blog
Kellgon - The Hacker Tutorial
Pirater comme un nul(l) | L'informatique c'est pas si compliqué
Home · AnarchoTechNYC/meta Wiki · GitHub
Uneedsec – Ethical Hacking & Pentesting Blog
ls /blog
SECURITY GEEK
DinoSec
Malwarebytes Labs - The Security Blog From Malwarebytes | Malwarebytes Labs
Welcome to SecurityTube.net
Hacking Articles - Raj Chandel's Blog
sploitspren - absolomb's security blog
VulnerabilityAssessment.co.uk
The Many Hats Club: An InfoSec Group For All Skill Levels
Hack The World · Juan Carlos Jimenez
CyberPunk: The Best Open Source CyberSecurity Tools
hack.lu 2018
Index of /
pofHQ | Pau Oliva Fora personal blog
Artificial truth
Hex Blog – State-of-the-art code analysis
Home | Ring 0x00
DotNetRussell – All things tech
Hacker Curriculum
LWN Security Resources [LWN.net]
Bits, Please! - Beniamini cyber security blog
Christophe Tafani-Dereeper - Personal tech and security blog about things I like, use, dislike and misuse.
Digital Operatives Blog
Jim Shaver | IT Security Professional
UT Austin Information Security Office – securus // vigilare // insanus
Development & Security | By Jurriaan Bremer @skier_t
Zer0Mem0ry (Zer0Mem0ry) · GitHub
You’ve Been Haacked | You’ve been Haacked and you like it is a blog about Technology, Software, Management, and Open Source. It’s full of good stuff.
PenTestIT - Your source for all things Information Security!
HighOn.Coffee • Security Research • Penetration Testing Blog
Jirairya security blog
Computer Security Student | Cyber Security Lessons, Tutorials, and Training
Compass Security Blog – Offensive Defense
Phrack Magazine
Servers for Hackers
defenceindepth
insecure.ws - Resources
Rebootuser – Just another bunch of 1's and 0's
Security Archives - RootUsers
CS342 Computer Security, Fall 2008 | Home
Schneier on Security
shell-storm | Home - static and dynamic program analysis, OSdev, reverse engineering, bugs exploitation, de-obfuscation - ROP Return Oritented Programming - Shellcode for ARM
Blog for and by my students, current and future...
Security Research * Penetration Testing Blog
Idea of the day
Checkmate - Pentest | Audits | Compliance | Forensics | INR
Information Security News|Data Breach Incidents|Hacking News
Chengyu Song - Automated Vulnerability Discovery/Elimination - Attacks spectre - malware analysis
Capt. Meelo - Hacking/Security Writeups
phackt.com:~#
Hack Forums - Underground forum - Hosted Mirai Botnet Author Anna-Senpai profile
Blog - Spain Cybersecurity Organism| INCIBE-CERT
MITRE ATT&CK™ Blog – Medium
Blog Archive | WhiteHat Security
Hacker101 - Learn How To Hack - Free Online Course | HackerOne
MalwareMustDie! · MMD Malware Research Blog
Bugcrowd Forum - community for hackers & security researchers
InfoSec · AnarchoTechNYC/meta Wiki · GitHub
Secure Belief - security resources - hacking challenges solutions
Quarkslab's blog - resource - reverse engineering, cryptography, exploitation, fuzzing, challenges
Megabeets — Behind the lab doors - hacking, malware, reverse engineering resources, writeups
Penetration Testing Lab | Offensive Techniques & Methodologies

MrRobot_Hacks_Analyses

MrRobot_Hacks-NullByte_Tutorials

Mr. Robot Hacks « Null Byte :: WonderHowTo
The Hacks of Mr. Robot: How to Send a Spoofed SMS Text Message « Null Byte :: WonderHowTo
The Hacks of Mr. Robot: How to Hide Data in Audio Files « Null Byte :: WonderHowTo
The Hacks of Mr. Robot: How to Send Ultra-Secure Emails « Null Byte :: WonderHowTo
The Hacks of Mr. Robot: How Elliot & Fsociety Destroyed Evil Corp's Data « Null Byte :: WonderHowTo
The Hacks of Mr. Robot: How to Spy on Anyone's Smartphone Activity « Null Byte :: WonderHowTo
The Hacks of Mr. Robot: How Elliot & Fsociety Made Their Hack of Evil Corp Untraceable « Null Byte :: WonderHowTo
The Hacks of Mr. Robot: How to Build a Hacking Raspberry Pi « Null Byte :: WonderHowTo

Season1

e1

Mr. Robot Episode 1 Analysis

e2

e3

e4

e5

e8

e6

e7

e9

e10_final

hdshredder mr robot - Google Search
Mr. Robot: every title and episode, explained—Hopes&Fears

e2

e3

A Peek Inside Mr. Robot’s Toolbox | WIRED
The Mr. Robot Hack Report: Skimming links for fun and profit - The Verge
Why Facebook Is Evil, According To Mindblowing New Series Mr. Robot
exit relays - Is the “Ron's Coffee” Tor-related hack technically possible in episode 1x01 of Mr. Robot? - Tor Stack Exchange
‘Mr. Robot’ Rewind: Hunting for flaws in an intense Episode 6 – GeekWire
‘Mr. Robot’ Rewind: Mostly accurate tech in a mind-blowing Episode 8 – GeekWire
DIY “Low Tech” Hacks of Mr. Robot - MR ROBOT HACKS
What we can learn from the hacks on season one of Mr. Robot
social engineering toolkit mr robot - Google Search
hdshredder mr robot - Google Search
osticket mr robot - Google Search

Season2

home mobile tower - Google Search
'Mr. Robot' episode analysis: 'Unmask Pt. 1' - Business Insider
‘Mr. Robot’ Rewind: Checking for vulnerabilities in Episode 4 – GeekWire
iPhone Cheats / Hack for Postmates - Food Delivery, Faster 2017
14.04 - What init 1 command exactly does? - Ask Ubuntu
mr robot putty config - Google Search
apn - Google Search
bitchx ssh irc - Google Search
BitchX IRC Client
‘Mr. Robot’ Rewind: Owning the FBI in Episode 5 – GeekWire
‘Mr. Robot’ Rewind: Backdooring a monitor for FBI surveillance in Episode Two – GeekWire
Hacking IRL: What Mr. Robot Teaches Us About Cybersecurity
The Mr. Robot Hack Report: Hacking Android phones with a rogue femtocell - The Verge
‘Mr. Robot’ Rewind: Booby-Trapping Femtocells from the Forest in Episode 3 – GeekWire
Yes, you can hack cell phones like on Mr. Robot—just not the way they did | Ars Technica
What’s a femtocell? Hacking Mr. Robot, Week 4.
Mr Robot TV show with TOR installation instructions. – Securitron Linux blog.
The Mr. Robot Hack Report: Lighting up the dark web - The Verge
fuxsocy mr robot - Google Search
Shellshock (software bug) - Wikipedia
How Mr. Robot’s Most Complicated Hack Yet Came Together
Mr Robot season 2 episode 5 review: Logic Bomb | Den of Geek
The Mr. Robot Hack Report: Stagefright and real-life ransomware - The Verge
Hacking ‘Mr. Robot’: 5 technology security lessons from the hit TV show – GeekWire
home mobile tower - Google Search
openwrt mr robot - Google Search
The Mr. Robot Hack Report: Cantennas and dirty USB drives - The Verge
Mr. Robot eps2.4m4ster-s1ave.aes – the security review – Naked Security
Femtocell - Wikipedia
15 Second Password Hack, Mr Robot Style | Technolust since 2005
Mr. Robot review: eps2.4_m4ster-s1ave.aes
‘Mr. Robot’ Rewind: An unreliable narrator, but mostly reliable tech in Episode 7 – GeekWire
Latest Mr. Robot episode pokes fun at Android users, security issues
Wickr, Mr Robot and the CryptoWars 2.0, page 1
What phone messenger software are the characters using in Mr Robot s02e06? - Quora
'Mr. Robot' uses a Pwn Phone, the work of one Boston-based startup
irc.colo-solutions.net/ – Mr. Robot Args
‘Mr. Robot’ Rewind: An exciting Episode 10 features social engineering and a Pringles ‘cantenna’ – GeekWire
How To Make a Wi-Fi Antenna Out Of a Pringles Can
Our Favorite Hacker Moments From Mr. Robot Season 2 | WIRED
1 answer: How does the makeshift high-powered Wi-Fi antenna from Mr. Robot work? - Quora
‘Mr. Robot’ Recap, Season 2 Episode 10 — Darlene Shot? | TVLine
Mr. Robot review: eps2.8_h1dden-pr0cess.axx
ROT13 - Wikipedia
Uninterruptible power supply - Wikipedia
ASCII 2 Hex
‘Mr. Robot’ Rewind: Pwning battery backups in an explosive season finale – GeekWire
Mr. Robot season 02 recap: 10 security lessons learned
A collection of "Mr. Robot" Season 2 Easter Egg Sites. #mrrobot #hackingrobot #robotegg
unixlegion.com: Mr. Robot eps2.3logic-b0mb.hc – the security review
‘Mr. Robot’ Rewind: Analyzing Fsociety’s hack-filled cyber heist in episode 6 – GeekWire
6 Ways Mr. Robot Is Putting Linux in the Public Eye
Mr. Robot – The Asocial
femtocell hacking - Google Search
Tanium - Behind the hack: Mr. Robot season 2 finale
D-Link: A Firmware Security Analysis – Part 1 | ReFirm Labs

Season3

Mr Robot Season 3 Ep.2 - Sup Forums
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0ahUKEwilxsXtw5_XAhXE7iYKHZxRBvgQFggoMAA&url=https%3A%2F%2Fnakedsecurity.sophos.com%2F2017%2F10%2F19%2Fmr-robot-eps3-1undo-gz-the-security-review%2F&usg=AOvVaw1OCDwqsGqznZFGblRdsweu
A Roundtable of Hackers Dissects 'Mr. Robot' Season 3 Episode 2: 'Undo' - Motherboard
Darlene And Elliot Try To Reconnect As ‘Mr. Robot’ Explores ‘Metadata’
The Hacks of Mr. Robot: How to Hack Bluetooth « Null Byte :: WonderHowTo
Mr. Robot Season 3 Episode 3 Review: Legacy
A Roundtable of Hackers Dissects 'Mr. Robot' Season 3 Episode 5: 'Runtime Error' - Motherboard
Very-small-aperture terminal - Wikipedia
Mr. Robot eps3.2_legacy.so – the security review – Naked Security
‘Mr. Robot’ Recap: Season 3, Episode 3, ‘Legacy’ — Tyrell Flashback | TVLine
Real World FSociety Malware Is Giving Mr. Robot a Bad Name
The Mr. Robot Hack Report: All about the Feds - The Verge
There’s Now a Mr. Robot-Inspired ‘fsociety’ Ransomware in The Wild - Motherboard
AlbinoGeek/Hardware-Mod: A mod for the game "Software Inc." which adds Computer Hardware.
Mr. Robot Disassembled: eps3.2_legacy.so – Ryan Kazanciyan – Medium
dns - How does Malware use Unregistered Domains - Information Security Stack Exchange
Command and control - C2 - Wikipedia
‘Mr. Robot’ Rewind: Hacking a DEF CON CTF in the lights out season 3 premiere – GeekWire
Mr. Robot Disassembled: eps3.0_power-saver-mode.h – Ryan Kazanciyan – Medium
The Mr. Robot Hack Report: Minesweeper and a fake stolen car - The Verge
Mr. Robot Disassembled: eps3.1_undo.gz – Ryan Kazanciyan – Medium
Mr. Robot Hacks, Season 3: How Elliot Covered his Tracks | hackers-arise
Mr. Robot eps3.3_metadata.par2 – the security review – Naked Security
A Roundtable of Hackers Dissects the Season 3 Premiere of 'Mr. Robot' - Motherboard
Mr Robot season 3 episode Eps3.0_Power-Saver-Mode.H – the security review – Naked Security

Mr. Robot's Netflix 'n' Hack · AnarchoTechNYC/meta Wiki
How the Real Hackers Behind Mr. Robot Get It So Right | WIRED
Mr. Robot Is the Best Hacking Show Yet—But It’s Not Perfect | WIRED
Hacking Techniques & Kali Linux - Mr. Robot Season 2 — The Hack Today
What has Mr. Robot done for the security industry? | CSO Online
mr robot shutting down the backdoor at DuckDuckGo
Zero Days | Deadline
HBO Developing ‘Stuxnet’ Drama Based On Alex Gibney’s ‘Zero Days’ | Deadline

Computers_Systems_Design

CPUs

Architectures

Archs-Assemblies-Low_Level_Programming

ABI-Calling_Conventions

Application binary interface - ABI - contains calling conventions - Embedded ABI, PowerPC, ARM, MIPS EABI
Calling convention - x86 32 bit vs ARM 32 bit vs ARM 64 bit vs PowerPC vs MIPS vs SPARC vs IBM System/360 vs SuperH vs 68k vs IBM 1130
api - What is an application binary interface (ABI)? ELF, PE, compatibility layer- Stack Overflow
System V Interface Definition - SVID - Wikipedia
System V ABI specifications papers - Xinuos Inc. | Developers | SCO Developer Specs
System V ABI - Interface Definition - calling conventions, function parameters passing - OSDev Wiki
What are the purposes of the ARM ABI and EABI? - Stack Overflow

x86_arch

Refs

Intel® 64 and IA-32 Architectures Software Developer’s Manual
Intel® 64 and IA-32 Architectures Software Developer Manuals | Intel® Software
'x86' tag wiki - definitive documentation resources list - SSE, SIMD

x86_32

x86_Refs

Corresponding_ABI-Calling_Conventions

SysV-ABI_1997 - First Draft
SysV-ABI_1997 - Updates History
System V ABI i386 - Architecture Processor Supplement - Fourth Edition

DEFINITIVE - HJLebbink/asm-dude Wiki · x86 -
x86 and amd64 instruction reference
X86 Opcode and Instruction Reference
Intel 80x86 Assembly Language OpCodes
Intel x86 JUMP quick reference - JO/JNO, JS/JNS, JE/JZ, JNE/JNZ, JP/JPE, JNP/JPO, JCXZ/JNCXZ, JB/JNAE/JC, JNB/JAE/JNC, JBE/JNA, JA/JNBE, JL/JNGE, JGE/JNL, JLE/JNG, JG/JNLE - definitive equivalence between x86 Jcc Jump instructions with respect to status flags CF,OF,SF,ZF etc
x86 Assembly Language Reference Manual
x86 calling conventions - cdecl, syscall - Wikipedia
Guide to x86 Assembly - <reg32>, <mem>, <con32> - Intel Syntax
x86 Assembly - Wikibooks, open books for an open world
Guide to x86 Assembly - AT&T Syntax
sandpile.org -- The world's leading source for technical x86 processor information.
Mirror of: Into the Void: x86 Instruction Set Reference
x86 instruction listings - Wikipedia

How does a 32-bit machine compute a double precision number - Stack Overflow
IA-32 = x86 = i386 - Intel Architecture 32 bits - 32-bit version of the x86 instruction set architecture - Wikipedia
assembly - Why are first four x86 GPRs named in such unintuitive order? - Retrocomputing Stack Exchange
x86 - What does multicore assembly language look like? - Stack Overflow
What is the difference between i386 and x86 architectures? - Quora
assembly - What does the `TEST` instruction do - definitive breakdown - Reverse Engineering Stack Exchange
assembly - test vs and vs or vs cmp in x86 - Test whether a register is zero with CMP reg,0 vs OR reg,reg? EFLAGS, ZF, CF - performance related - Stack Overflow
assembly - test eax against eax? test vs and, cmp vs sub, JZ = JE, JNZ = JNE - EFLAGS ZF, CF, OF, PF, SF - in x86 assembly- definitive answer - Stack Overflow
Understanding how function call works - x86 32 bits - stack management
Where the top of the stack is on x86 - Eli Bendersky's website

x86_64

x86_64_Refs

Introduction to x64 Assembly | Intel® Software

Corresponding_ABI-Calling_Conventions

x86_64-elf-abi-0.99.pdf
2013 Draft - System V Application Binary Interface ABI - AMD64 Architecture Processor Supplement (With LP64 and ILP32 Programming Models)
assembly - Difference in ABI between x86_64 Linux functions and syscalls - Stack Overflow
Overview of x64 Calling Conventions
windows - Why does Windows64 use a different calling convention from all other OSes on x86-64? - Stack Overflow
2014 Draft - System V Application Binary Interface ABI - AMD64 Architecture Processor Supplement
X86 psABI · hjl-tools/x86-psABI - unwind

Let's Write Some x86-64 - Nick Desaulniers
x86-64 = x64 = amd64 = Intel 64 - 64 bits extension version of x86 32 bits ISA -Different from IA-64 Itanium architecture
Why can I access lower dword/word/byte in a register but not higher? - Stack Overflow
x64 Software Conventions
intel 64 vs amd64 at DuckDuckGo
64bit - What is the difference between x64 and IA-64? - Stack Overflow
Stack frame layout on x86-64 - Eli Bendersky's website
c - What is the purpose of the RBP register in x86_64 assembler? -fomit-pointer - System V ABI - frame/base pointer - Stack Overflow
DEFINITIVE - 64-bit - The definition of a 64-bit system and overview of its evolution Architecture of 64-bit systems Data model, types' sizes, alignment

Memory_Management

assembly - Difference between memory location and memory segment - Stack Overflow
c - Does a stack allocate more space if needed or does it overflow? Storing data beyond ESP on stack - Signal Handler use of stack- stack size change with ld - Stack Overflow
c - Explain esp-ebp in this program - Allocating more space than needed on stack - -mpreferred-stack-boundary in GCC - stack smashing detection on buffer overflow, fno-stack-protector - cdecl calling convention - Stack Overflow
c++ - Why more space on the stack frame is reserved than is needed in x86 - 16-bytes alignment - LEA instruction - LP64 data model - Stack Overflow
gcc - Stack allocation, why the extra space? 16-bytes alignment, extra space allocation on stack - x86 - gcc - Stack Overflow

Syntaxes

assembly - NASM (Intel) versus AT&T Syntax: what are the advantages? - Stack Overflow
c - Limitations of Intel Assembly Syntax Compared to AT&T - Stack Overflow

docs/x86.md at master · corkami/docs · GitHub
NOP - Wikipedia
FLAGS register - eflags - Wikipedia
Status register - Wikipedia
x86 memory segmentation - segment, offset, address - real/protected mode - segment registers - kernel code segment
Memory Segmentation in 8086 Microprocessor - GeeksforGeeks
c - Function called in a file without a prototype produce different results on ARM and x86-64 - Stack Overflow
assembly - What's the purpose of the nop opcode? - Stack Overflow
Why do we need the "nop" I.e. No operation instruction in microprocessor 8085? - Electrical Engineering Stack Exchange
c - What is __i686.get_pc_thunk.bx? Why do we need this call? - Stack Overflow
x86 Assembly MOV instruction - Register to Register and Memory to Memory - Stack Overflow
assembly - Why can't MOV have both operands as memory locations? - Stack Overflow
mov instructions with byte destination for immediate to memory - Assembly - Stack Overflow
performance - Does a mov instruction that involve memory access get done slower than mov between registers - Stack Overflow
x86 - Memory-to-memory copy - Stack Overflow
assembly - Memory to memory MOV - Correct Syntax - Stack Overflow
Is the "MOV" instruction in Assembly to allocate memory? - Stack Overflow
gcc - TEST Instruction and AND Instruction x86 - Stack Overflow
TEST (x86 instruction) - Wikipedia
gdb - What is the difference between leave and ret - Stack Overflow
assembly - "enter" vs "push ebp; mov ebp, esp; sub esp, imm" and "leave" vs "mov esp, ebp; pop ebp" - Stack Overflow
c - Cost of push vs. mov (stack vs. near memory), and the overhead of function calls - Stack Overflow
assembly - Push/Pop vs Mov in MASM - Stack Overflow
c - Assembly x86 - "leave" Instruction vs enter - Stack Overflow
assembly - Frame Pointer Explanation - Software Engineering Stack Exchange
performance - What is the purpose of the EBP frame pointer register? IA-32/x86 - frame/base pointer obsolescence - stack unwinding - Stack Overflow
Getting the call stack without a frame pointer
c++ - What is exactly the base pointer and stack pointer? To what do they point? - Stack Overflow
Assembly Language: Is there any difference between frame pointer and base pointer? - Quora
assembly - What is the difference between MOV and LEA? - Stack Overflow
assembly - What do the brackets mean in x86 asm? - Stack Overflow
assembly - LEA or ADD instruction? - Stack Overflow
x86 - Assembly language - can LEA instruction be used to load value - Stack Overflow
x86 - Why can assembly instructions contain multiplications in the "lea" instruction? - Stack Overflow
assembly - Is a shift instruction faster than an IMUL instruction? - Stack Overflow
c - Using LEA on values that aren't addresses / pointers? - Stack Overflow
assembly - What's the purpose of the LEA instruction? - lea vs mov x86 Stack Overflow
assembly - LEA or ADD instruction? - Stack Overflow
assembly - How is the x86 JAE instruction related to the carry flag? jae = jnc = jnb - Relationship with cmp and sub - Stack Overflow
x86 16 - Why does CMP (compare) sometimes sets a Carry Flag in 8086 assembly? - Stack Overflow
math - Overflow and Carry flags on Z80 - Stack Overflow
Jumps, flags, and the CMP instruction Article - definitive thorough analysis of SF, ZF, CF and OF flags as they get changed by CMP instruction - JMP instructions family - signed vs unsigned binary arithmetics
memory management - Is the EBP register (base frame pointer) only for Debugging in x86? -fomit-pointer - frame/base pointer obsolescence - stack unwinding - Stack Overflow
x86 - Assembly - JO/JNO, JS/JNS, JE/JZ, JNE/JNZ, JP/JPE, JNP/JPO, JCXZ/JNCXZ, JB/JNAE/JC, JNB/JAE/JNC, JBE/JNA, JA/JNBE, JL/JNGE, JGE/JNL, JLE/JNG, JG/JNLE - definitive equivalence between x86 Jcc Jump family instructions with respect to status flags CF,OF,SF,ZF etc - after CMP - Stack Overflow
Adjust flag - AF - Auxiliary Flag/Carry
What is the difference between LEA and MOV offset instruction in assembly-level programming? load effective address x86
cpu - x86/IA-32 registers: MBR/MDR and instruction registers - Current Instruction Register (CIR) or Memory Buffer Registers (MBR)/Memory Data Registers (MDR) - definitive Peter Cordes answer - instruction cycle, decoding
IA-64 - Itanium - Not to be confused with x86-64 - Wikipedia
x86 - family of instruction set architectures initially developed by Intel - 16/32/64/128/256/512 bits registers - SSE/SIMD - protected mode - x86-64
x86 = Intel 80x86, IA-32

MicroBlaze

MicroBlaze - similar to the RISC-based DLX architecture described in a popular computer architecture book by Patterson and Hennessy - soft microprocessor core designed for Xilinx field-programmable gate arrays (FPGA). As a soft-core processor, MicroBlaze is implemented entirely in the general-purpose memory and logic fabric of Xilinx FPGAs

ARM

ELF for the ARM Architecture - IHI0044F_aaelf.pdf
Local Variables on the Stack - ARM assembly, prologue/epilogue
ARM architecture - Wikipedia
List of ARM microarchitectures - Wikipedia
Is ARM a microprocessor or microcontroller? cpu vs mcu, rapsberry pi, flash memory - definitive breakdown- raspberry pi, ESP8266, set-top-box, modem/router

SPARC

SPARC - reduced instruction set computing (RISC) instruction set architecture (ISA)

PowerPC

PowerPC - soft microprocessor (also called softcore microprocessor or a soft processor) is a microprocessor core that can be wholly implemented using logic synthesis. It can be implemented via different semiconductor devices containing programmable logic (e.g., ASIC, FPGA, CPLD), including both high-end and commodity variations - largely based on IBM's earlier POWER instruction set architecture, and retains a high level of compatibility with it; the architectures have remained close enough that the same programs and operating systems will run on both if some care is taken in preparation; newer chips in the POWER series use the Power ISA
IBM POWER instruction set architecture - reduced instruction set computer (RISC) instruction set architecture (ISA) developed by IBM. The name is an acronym for Performance Optimization With Enhanced RISC

MIPS

MIPS architecture - Wikipedia

Itanium

IA-64 Itanium
Cray Y-MP - Wikipedia

CPUs_Word_Size

Processor, OS : 32bit, 64 bit - Stack Overflow
how much memory can be accessed by a 32 bit machine? - Stack Overflow
What is the max. capacity of RAM in 32-bit machine? Why it is not 16GB? - Super User
If I have a 32-bit CPU, how can I have more than 2^32 bits (0.5Gb) of RAM? - Quora
Answer - Quora
why can't 32 bits cpu handle 64 bits addresses by splitting them across register - Google Search
32-bit fixed instruction length in 64-bit memory space - Stack Overflow
32-bit - Wikipedia
32-bit vs. 64-bit systems - Super User
Why don't we have 33-bit CPUs? - Super User
64-bit computing - 32-bit vs 64-bit - LP64/LLP64 and ILP64/SILP64 Data Model - two's complement - (un)intptr_t - Address spaceWikipedia
cpu - How much memory can a 64bit machine address at a time? - Super User
Why can a 32-bit Go program handle 64-bit numbers? - Quora
memory - Why does a 32-bit OS support 4 GB of RAM? - Stack Overflow
32-Bit vs. 64-Bit | Digital Trends
Why can't 32-bit Windows access 4GB of RAM? | PCWorld
Clearing up the 32/64-bit memory limit confusion | ZDNet
memory - If 32-bit machines can only handle numbers up to 2^32, why can I write 1000000000000 (trillion) without my machine crashing? - Super User
64 bit - How many memory addresses can we get with a 32-bit processor and 1gb ram? - Super User
why does a 64bit cpu handle only 2 power48 addresses at DuckDuckGo
x86 64 - Why do 64 bit systems have only a 48 bit address space? - Stack Overflow
c++ - Long long int on 32 bit machines - Stack Overflow
cpu - How many bytes a 64 bit processor processes? - Super User
computer architecture - Why does a processor have 32 registers? - Computer Science Stack Exchange
memory - Addressing on 32bit and 64bit architectures - Stack Overflow
Why do x86-64 systems have only a 48 bit virtual address space? - byte-addressable -
assembly - Why in 64bit the virtual address are 4 bits short (48bit long) compared with the physical address (52 bit long)? - PAE - Stack Overflow
In the CPU, does the 64-bit data bus also mean a 64-bit address bus? - Quora
computer architecture - What all can be said when you say that the CPU is 32 bit? - n bits CPU defiinition - Computer Science Stack Exchange
c - x86_64 ASM - maximum bytes for an instruction? - Stack Overflow
computer architecture - How can a CPU access more memory locations than 2^wordsize? - Computer Science Stack Exchange
memory - Is it the address bus size or the data bus size that determines "8-bit , 16-bit ,32-bit ,64-bit " systems? - Super User
Why should the data bus width be matched to the word size of the CPU? - Quora
terminology - Is word size, the size of a memory location? the size of the data bus? or the cpu register size? definitive explanation
computer architecture - Difference between data bus, address bus and CPU bit size - Computer Science Stack Exchange
computer architecture - word size and data bus - Stack Overflow
Why can't OS use entire 64-bits for addressing? Why only the 48-bits? - Stack Overflow
64bit - Using the extra 16 bits in 64-bit pointers - definitive in-depth insights about 48 bit limitation in x86-64/amd64 CPUs - sign extension risks in C++ - Stack Overflow
How are CPU architecture and word size related? - Computer Science Stack Exchange
If a CPU has a 16 bit address bus and 8 bit words, how much memory can it address? definitive word definition

Machine_Code

Is it possible to program in binary? - Stack Overflow
Programming directly in binary - machine code - Software Development | DaniWeb
Is it possible for someone to code directly in binary? - Quora
Fat binary - Multi-architecture binary - Wikipedia

GitHub - gurugio/lowlevelprogramming-university: How to be low-level programmer - definitive resources list - Hardware, firmware - Linux kenel and device driver programming - Implementing own Kernel - busybox, filesystem - Assembly languages resources - awesome
GitHub - Maijin/awesome-asm: A curated list of awesome Assembler
GitHub - gurugio/book_assembly_8086
Why is the assembly language called so? - Quora
Opcode - Wikipedia
Assembly language - Wikipedia
Executable and Linkable Format - Wikipedia
What does an object file contain? - Stack Overflow
objdump - Wikipedia
Core dump - crash dump, memory dump, or system dump - Wikipedia
Binary file - Wikipedia
Machine code - Wikipedia
Hex dump - Wikipedia
binary - Are binaries portable across different CPU architectures? - Unix & Linux Stack Exchange
NOP (code) = no-op = NOOP - No Operation Assembly Instruction - Programming and Network Protocols - NOP slide - Wikipedia
Function prologue and epilogue - enter, leave, call, ret - Wikipedia

Archs_Comparison

difference memory segments architectures - Google Search
What is the actual difference between x86, ARM and MIPS architectures? RISC vs CISC, security, virtualization - class of ISA, register-memory vs load-store, memory addressing, addressing modes, types of sizes and operands, control flow instructions, ISA encoding
ARM vs X86 - Key differences explained! - Android Authority
The Differences Between ARM and Intel x86 - Make Tech Easier
What's the difference between ARM and x86 processors? - RISC vs CISC
DEFINITIVE RISC vs. CISC comparison
Understanding the Differences Between ARM and x86 Processing Cores - News
What is the difference between AVR and ARM? - Quora
[Discussion] Are AMD and Intel the only two companies that have their processors out? If so, why are there no other companies? If not, then why are they not being suggested? : buildapc
Arm vs x86: more choices, tougher decisions | Anders Electronics
Why is it that most Single-board computers are ... | element14 | Raspberry Pi
Why x86 is Still Relevant to Embedded Engineers
ARM vs x86: Is x86 dead?
Open access to the Proceedings of the 27th USENIX Security Symposium is sponsored by USENIX.Inception: System-Wide Security Testing of Real-World Embedded Systems Software

Processor design - Wikipedia
Instruction set architecture - Wikipedia
Reduced instruction set computer - Wikipedia
Complex instruction set computer - Wikipedia
Von Neumann architecture - Wikipedia
The final ISA showdown: Is ARM, x86, or MIPS intrinsically more power efficient? - Page 2 of 3 - ExtremeTech
cpu - Is x86 RISC or CISC? - Stack Overflow
An Engineer's Options & Futures: Intel x86 Processors – CISC or RISC? Or both??
architecture - What does the 'R' in x64 register names stand for? - Software Engineering Stack Exchange
Instruction cycle - aka Fetch–Decode–Execute cycle or simply the Fetch-Execute cycle - where is an instruction held when loaded by a CPU - Fetch, Decode, Execute, Repeat Cycle/Loop - Booting process, ROM, boot sequence, startup code - Program Counter PC, Memory Address Register MAR, Memory Data/Buffer Register MDR/MBR, Current Instruction Register CIR, Control Unit CI, ALU, FPU - instuction pipeline, concurrency, parallel/multithreaded execution
CPU Cores vs Threads - TechSiting
What Are Threads in a Processor? vs Core - CPU
Differences between physical CPU vs logical/virtual CPU vs Core vs Thread vs Socket/Connectors
multithreading - Threads vs Cores - Stack Overflow
multiprocessor - So what are logical cpu cores (as opposed to physical cpu cores)? - HyperThreading
Instruction Pipelining in RISC CPUs
Load–store architecture - ISAs that divide instructions into memory access (load and store between memory and registers), and ALU operations (which only occur between registers) - Examples RISC instruction set architectures such as PowerPC, SPARC, RISC-V, ARM, and MIPS, and GPUs as well - vs CISC/x86 ISAs
Register memory architecture - ISAs - operations to be performed on (or from) memory, as well as registers.[1] If the architecture allows all operands to be in memory or in registers, or in combinations, it is called a "register plus memory" architecture - Examples of register memory architecture are IBM System/360, its successors, and Intel x86. Examples of register plus memory architecture are VAX and the Motorola 68000 series.
computer architecture - Where does the CPU get its first instructions from? - boot sequence, startup code, ROM memory - Fetch Execute instruction cycle
Load–store unit - LSU
Processor (computing) - CPU architectures, models - definitive outline
Instruction register = IR = Current Instruction Register = CIR - CPU's control unit CU - microcode circuits - In the instruction cycle, the instruction is loaded into the instruction register after the processor fetches it from the memory location pointed to by the program counter PC (RIP/EIP)

Data_Representation

Information_Theory

Scientists discover new mechanism for information storage in one atom
Information theory - Wikipedia
Entropy (information theory) - Wikipedia

Endianness

Comparison_Endianness_Orderings

War between little and big endian
architecture - What is the advantage of little endian format? - Software Engineering Stack Exchange
What are the advantages of using Big Endian over Little Endian in a computer architecture? Why do some designers decide to use Big Endian? - Quora
Big-Endian “is effectively dead” | Hacker News
Little-endian vs. big-endian | The ryg blog
computer science - Why are both little- and big-endian in use? - Stack Overflow
Why were microprocessors built as big or little endian? Why did Intel choose little endian architecture? - Quora
endianness - What are the benefits of the different endiannesses? - Stack Overflow
Is Big or Little Endian better, and why? - Quora
Little Endian vs Big Endian – The Bit Theories

Handling_Data_Endiannes_in_Code

Writing Endian Independent Code in C++ - General and Gameplay Programming - GameDev.net
How to write endian agnostic C/C++ code? - Stack Overflow
byte - C program to check little vs. big endian - Stack Overflow
endianness - How do I convert between big-endian and little-endian values in C++? - Stack Overflow
The byte order fallacy

Endianness - Little/Big/Bi-Endian - Byte Order - Bit Endianness/Order
cpu - What determines endianness - Super User
endianness - How to check whether a system is big endian or little endian? - Stack Overflow
architecture - C Macro definition to determine big endian or little endian machine? - Stack Overflow
What is LITTLE-ENDIAN and BIG-ENDIAN coversions? - Quora
Big Endian / Little Endian
byte - Is there a oneliner that converts a binary file from little endian to big endian? - Unix & Linux Stack Exchange
architecture - Why is x86 little endian? - Stack Overflow
x86 64 - So on x86-64 it's big endian? - Stack Overflow
64bit - Is there any "standard" htonl-like function for 64 bits integers in C++? - Stack Overflow
c++ - Detect endianness of binary file data - Stack Overflow

Data_Alignment-Memory_Access_Granularity

CPU and Data alignment - Stack Overflow
Data structure alignment - data alignment, data structure padding, and packing - Wikipedia
c++ - What is data alignment? Why and when should I be worried when typecasting pointers in C? - Stack Overflow
assembly - Why data alignment is used exactly? - Software Engineering Stack Exchange
architecture - Confused about data alignment - Stack Overflow
assembly - Why does System V / AMD64 ABI mandate a 16 byte stack alignment? The historical 4-byte stack alignment was also insufficient for efficient 8-byte double on modern CPUs
Word Alignment
x86 - Memory alignment on a 32-bit Intel processor -SIMD - cache lines
definitive - Why do processors need memory alignment - Purpose of memory alignment - Atomicity, Concurrency - CPU Cache Lines - PIO vs DMA
Data Alignment - Memory access granularity - Definitive visual explanation with diagrams - natural boundaries - __declspec(align(16))) - SSE Streaming SIMD Extensions
Data alignment for speed: myth or reality? ARM vs x86 aligned/misaligned data - Performance Test of program using misaligned data
c - Does unaligned memory access always cause bus errors? performance overhad, slower - x86/x64 support misaligned data while IA-64 Itanium does not - Emulation - Stack Overflow
c - Does unaligned memory access always cause bus errors? performance overhad, slower - x86/x64 support misaligned data while IA-64 Itanium does not - Emulation - Stack Overflow
Data Alignment Fundamentals: Straighten up and fly right - Single/Double/Quad Memory Access Granularity - Purpose of Multi-Bytes Granularity - How does a processor/cpu see the memory – definitive in-depth article, visual explanation with diagrams - Lazy processors - Performance, speed - PowerPC, Motorola 68000, MIPS
c++ - How to find out memory access granularity ? - Stack Overflow
c - What does it mean to align the stack? Stack Alignment on 16-byte boundaries for SSE instructions performance
Double-byte memory access granularity - Memory Alignment, natural boundaries

Stack_Alignment

disassembly - What is the purpose of these instructions before the main preamble? definitive and best explanation - C Stack Frames, C Runtime Environment, Linux Process Anatomy, _lib_start_main(), __gmon_start__(), diagram of program start up execution from loader to main- detailed memory segments model : memory mapping segment, kernel space, bss, data, text segments - main argument argc in ecx register - 16-bytes memory alignment of main function stack frame - _start(), __libc_start_main(), __libc_csu_init() functions - Reverse Engineering Stack Exchange
disassembly - basic reversing question about local variable - memory alignment, function preamble/prologue in assembly x86, i386 ABI - definitive in-depths explanation - -mpreferred-stack-boundary gcc default alignment

c - Why does CPU access memory on a word boundary? granularity, hardware related reasons - definitive - purpose - IA-32 x86 vs Itanium IA-64 - boundary setting
c++ - why 128 bit/16 bytes variables should be aligned to 16 Byte boundary - memory page, data/stack alignment - definitive explanation of the reasons - hardware limitations - SSE2 instructions on x86 - _m128i type, SIMD - hardware support for misaligned data, movups - performance purposes - CPU memory access granularity
computer architecture - Advantage of byte addressable memory over word addressable memory - Computer Science Stack Exchange
definitive - Why is memory alignment needed? CPU memory access granularity - byte oriented
Memory Alignment - visual epxlanation
Memory access and alignment - consequences of misalignment across CPU architectures - ARM, c86 - memory access granularity
c - Why does compiler align N byte data types on N byte boundaries? alignment, natural boundaries -
Does aligning memory on particular address boundaries in C/C++ still improve x86 performance? definitive - alignment, SIMD - alignas
Aligned vs. unaligned memory access - hardware, measurements, implementation
Design Principles - on memory alignment performance
c++ - Can modern x86 hardware not store a single byte to memory? - byte addressing/addressable vs word - C++ memory model - multithreading/concurrency - RMW - atomic/non-atomic - CPU cache line, L1D - MMIO -
performance - Are there any modern CPUs where a cached byte store is actually slower than a word store? - Stack Overflow
c++ - Why is integer assignment on a naturally aligned variable atomic on x86? natural alignment - data alignment - std::atomic, stdatomic
Structure packing with the GNU C compiler - #pragma pack
Memory alignment is always power of 2 - access granularity - x86 vs ARM unaligned/misaligned data reading - performance cost - page granularity
operating system - Basic boot terms - Stack Overflow

Numeral_Systems_Used_In_Computers

Binary_Positional_Numeral_System

Logic_Gates-Bitwise_operations

Logic gate - Wikipedia
Instruction pipelining - Wikipedia
Bit array - bit map, bit set, bit string, or bit vector - C++ std::vector<bool>, std::bitset
Bit Array in C++ - std::bitset vs std::vector<bool>
Performance of C++ Bit-vector Implementations - bit set - boost dynamic bitset - std vector char - Qt::QBitArray
Bit Shift and Bitwise Operators
https://cybergibbons.com/uncategorized/bitwise-operations-or-how-i-learned-to-stop-worrying-and-love-my-compiler/
Low Level Bit Hacks You Absolutely Must Know - good coders code, great coders reuse - bitwise - definitive tricks
Bitwise operation - Wikipedia
Bits, Bytes, Building With Binary - bitwise

Bit - aka shannon
8-bit - Wikipedia
Nibble - Wikipedia
Octet (computing) - Wikipedia
Bit numbering - Least Significant Bit/Byte LSB, Most Significant Bit/Byte MSB - LSBit/LSByte, MSBit/MSByte - Wikipedia
Binary number - binary arithmetics : addition, substraction, multiplication, division - tow's complement, signed representation - Wikipedia
Mask (computing) - Wikipedia
Signed number representations - Sign-and-Magnitude, Two's representation, Ones Representation - Offset Binary - Negative base - Wikipedia
Ones' complement - Wikipedia
Two's complement - sig bit
Sign bit - MSB - most signifcant bit - two's complement - Wikipedia
Signedness - Integer literals, U suffix - Comparison between signed and unsigned - Wikipedia
Binary Subtraction with 2's Complement - Stack Overflow
Exclusive or - Wikipedia
XOR -- from Wolfram MathWorld
definitions2.pdf
binary - two's complement, why the name "two" - Stack Overflow
Digital Electronics - Ones & Twos Complement
numeral representations - Why octal and hexadecimal? Computers use binary and humans decimals - Computer Science Stack Exchange
Why do we use octal number systems? And where do we apply octal number systems? - Quora
Why is a byte EXACTLY 8 bits? - Quora
hardware - What is the history of why bytes are eight bits? - Software Engineering Stack Exchange
Is a byte always 8 bits? - Stack Overflow
Why is 1 Byte equal to 8 Bits? - Stack Overflow
radix math theory - Google Search
Two's Complement - proof, examples
Binary: Plusses & Minuses (Why We Use Two's Complement) - Computerphile - YouTube
binary - Why Two's Complement works - Mathematics Stack Exchange
computer science - Why Two's Complement? - Stack Overflow
binary - Why prefer two's complement over sign-and-magnitude for signed numbers? definitive explanantion about negative MSB choice in Rpant's answer - Stack Overflow
Two's Complement - fundamentals, definitive academic breakdown - comparison againt radix 10 arithmetic
Mathematics of computer integers – The Mindful Programmer
Why We Use Two’s Complement – The Mindful Programmer
How integers are stored in memory using two’s complement. -.2’s complement wheel
What is “2's Complement”? - Stack Overflow
arithmetic - Subtraction when second number is bigger than first number - ten's complement vs two's complement - Mathematics Stack Exchange
arithmetic - Subtraction by addition - nines complement, ten's complement - Mathematics Stack Exchange
Unsigned Integer Binary Subtraction - negative substraction - Mathematics Stack Exchange
Why does the "flip the bits and add 1" two's complement conversion method work? definitive explanantion, comparison with base 10, 10's complement : learnprogramming
Understanding the most and least significant bit - parity bit, error detection
integers - Alternative decimal number representation - 10-adic representation, ten's complement vs two's complement - Mathematics Stack Exchange
proof verification - Subtraction with a negative result - Mathematics Stack Exchange
Proof involving two's complement arithmetic of binary numbers - Mathematics Stack Exchange
A formal approach to twos complement binary representation of integers - definitive formal mathematical proof - Geometric Series formula | Mauro Bringolf
Binary arithmetic proof with two's complement - Mathematics Stack Exchange
Overflow & Underflow - Binary arithmetics - YouTube
math - What are arithmetic underflow and overflow in C? - Stack Overflow
The CARRY flag and OVERFLOW flag in binary arithmetic - definitive academic course - signed vs unsigned integer arithmetics - CPU ALU Arithmetic Logical Unit - Very detailed explanation of Overflow and Carry flags evaluation techniques - automated ways of detecting overflow errors in two's complement binary arithmetic - definitive in-depth detailed academic course - "overflow" in English language vs overflow flag - unsigned vs signed arithmetic
Carry and borrow (arithmetic) - carry flag/bit - Wikipedia
Arithmetic Operations on Binary Numbers -Overflow/Carry rules for addition, substraction, multiplication and addition
What is the difference in carry and overflow flag during binary multiplication? - definitive breakdown - signed vs unsigned integer arithmetics with respect to difference between OF and CF - ALU - Quora
Carry flag - Wikipedia
assembly - How does an adder perform unsigned integer subtraction? definitive formal proof of borrow in substraction VS carry in corresponding two's complemented addition - unsigned vs signed integer arithmetic - Stack Overflow
x86 64 - Assembly x86-64 setting carry flag for sub instruction - definitive answer - equivalence overflow flag in substraction VS carry flag in corresponding two's complement addition - unsigned vs signed integer arithmetic - Stack Overflow
math - Arithmetic Overflow vs. Arithmetic Carry - unsigned vs signed integer arithmetic - Stack Overflow
math - carry/overflow & subtraction in x86 - every possible combination of the 4 arithmetic flags OF, SF, ZF, CF that can result from the ADD and SUB instructions on x86 - Stack Overflow
Arithmetic underflow - Regarded as negative overflow - Integer overflow/wraparound - Wikipedia
binary - Arithmetic Overflow and Underflowing - Overflow in signed integer arithmetics - Mathematics Stack Exchange
hex - What is a borrow in hexadecimal subtraction? (Assembly) - definitive explanation with great examples, carry in, carry out, borrow, raw carry - Stack Overflow
language agnostic - Single most effective practice to prevent arithmetic overflow and underflow - Stack Overflow
Two’s Complement Representation: Theory and Examples
2's-Complement Binary Numbers- proof
arithmetic - Prove decimal number pattern for its n-bit 2's compliment - proof - Mathematics Stack Exchange
Overflow flag - V flag - definitive breakdown - SF xor OF - Wikipedia
Signed zero - Wikipedia
Sign extension/propagation - x86 and x64 instructions CBW, CWD, DWDE, CDQ, move with sign extension MOVSX - Zero Extension with MOVZX instruction -
who had the idea of sign bit binary at DuckDuckGo
Binary prefix - Wikipedia
Binary data - Wikipedia
Boolean algebra - bitwise
How does the CPU know we are using one's complement or two's complement for representing negative numbers? IEEE 754 floating point unit FPU - definitive - microcodes - ALU
cpu - How does a computer deal with subtraction of 2 values that are in two's complement? logic gate
redundant binary representation (RBR) is a numeral system that uses more bits than needed to represent a single binary digit so that most numbers have several representations. An RBR is unlike usual binary numeral systems, including two's complement
shannon (unit) - aka bit
Three-valued logic - ternary logic
Kilobyte - kibibytes
computer architecture - how 16 bits address lines address 64KB? why 64 KB = 65536 bytes - definitive

Computer number format - Binary, Octal, Hexadecimal, Base64 - Conversion between bases - Fraction representation through Fixed-point numbers and Floating-point numbers - Wikipedia
Hexadecimal - Wikipedia
Base64 - MIME - UTF-7 - OpenPGP - Wikipedia
Zero-based numbering - Wikipedia

Character_Set_Encoding_Formats

unicode - UTF-8, UTF-16, and UTF-32 - Stack Overflow
The differences between ASCII, ISO 8859, and Unicode
Unicode - Wikipedia
UTF - Unicode Transforamtion Format - UTF-1 UTF-7 UTF-8 UTF-16 UTF-32
UTF-8 Everywhere - definitive comparison between UTF-8/16/32, ASCII - wchar_t, C++
c++ - What is the difference between "Wide character" set and "Unicode character set"? - wchar_t
encoding - ascii vs unicode vs utf - What is Unicode, UTF-8, UTF-16? definitive breakdown/comparison - Unicode code point - ISO 8859-1, ASCII - Basic Multilingual Plane (BMP) - endiannes
The Absolute Minimum Every Software Developer Absolutely, Positively Must Know About Unicode and Character Sets (No Excuses!) – definitive - ascii, unicode, utf, encoding
character encoding - Unicode, UTF-7/8/16/32, ASCII, ANSI format differences - definitive - code point - Basic Multilingual Plane (BMP)
What's the difference between ASCII and Unicode? ASCII Origin, rise of Unicde - definitive historical summary - UTF-8/16/32 - ASCII Extended
What-are-the-similarities-and-differences-between-7-bit-and-8-bit-ASCII - extended ASCII
ASCII - control/printable characters - 7 bit vs 8 bit codes
List of information system character sets -
Extended ASCII - Extended ASCII (EASCII or high ASCII) character encodings are eight-bit or larger encodings that include the standard seven-bit ASCII characters, plus additional characters - 8 bits

Ternary numeral system - balanced ternary system, comprising the digits −1, 0 and +1, used in comparison logic and ternary computer - base/radix 3 - high z - ternary digit trit - vs binary, senary, decimal - Nonary (base 9, each digit is two ternary digits) or septemvigesimal (base 27, each digit is three ternary digits) can be used for compact representation of ternary, similar to how octal and hexadecimal systems are used in place of binary - Some ternary computers such as the Setun defined a tryte to be six trits or approximately 9.5 bits (holding more information than the de facto binary byte)
Balanced ternary - non-standard positional numeral system (a balanced form), used in some early computers[1] and useful in the solution of balance puzzles.[2] It is a ternary (base 3) number system in which the digits have the values –1, 0, and 1, in contrast to the standard (unbalanced) ternary system, in which digits have values 0, 1 and 2.
Signed-digit representation - balanced form
High impedance - aka hi-Z, tri-stated, or floating
Ternary computer - optical computers - Donald Knuth opinion
Why does RAM come in specific sizes (256, 512, 1024, 2048, etc) - definitive
Why binary and not ternary computing? - SQL trinary/terary logic - radix economy
Power of two - permutation of n bits, arranging - definitive on RAM/memory measure/size

Data (computing) - Wikipedia
how are bytes represented in binary file at DuckDuckGo
Binary code - Wikipedia
hexdump - Why don't you see binary code when you open a binary file with text editor? - Super User
What are the weird characters onscreen when one opens an exe file using a text editor? - Quora
binaryfiles - What exactly causes binary file "gibberish"? - Stack Overflow
hexadecimal - Why are hex editors called binary editors? - Super User
If texts are also fundamentally bytes, what is the difference between a text and a byte/binary file? - Quora
What is the advantage of storing data in binary format rather than text files? - Quora
Converting Between Binary, Octal, Decimal, and Hexadecimal Number Systems - Robot Room
Hexadecimal system: describes locations in memory, colors
02-bits-ints-part1.pdf
Why Binary Files are Needed
memory hardware - How does a computer determine the data type of a byte? - Computer Science Stack Exchange
How does my computer store things in memory?
Binary-coded decimal - BCD - Wikipedia
Integer (computer science) - Wikipedia
Fixed-point arithmetic - Wikipedia
Floating-point arithmetic - Wikipedia
Orders of magnitude (data) - powers of two VS powers of ten - Wikipedia
ROM image - hacking - security - reverse engineering
System image - disk / process image - core dump
Binary File Descriptor library - BFD - core dump, used in gnu binary utils binutils tools, gnu assembler GAS, gnu linker, gnu debugger gdb
Byte - historical development - non 8 bit byte machines - smallest addressable unit of memory in many computer architectures
65,535 - TCP/UDP ports number
65,536 - Wikipedia

CPU_Internal_Storage-Memory

CPU_registers

cpu cache vs register at DuckDuckGo
Are CPU registers and CPU cache different? - Stack Overflow
Processor register - Wikipedia
linux - Understanding cpu registers - Stack Overflow
x86 - How are the segment registers (fs, gs, cs=code segment, ss=stack segment, ds=data segment, es=extra segment) used in Linux? - Reverse Engineering Stack Exchange
terminology - What are CPU registers? - Software Engineering Stack Exchange
Processor register - Wikipedia
Memory address register - Wikipedia
Explain role of different registers like IR, PC, SP, AC, MAR and MDR used in $V_{nn}$ Neumann model.
microcontroller - difference between memory address register(MAR) and program counter(PC)? - Stack Overflow
cpu - What is the difference between "Memory address" and "Program counter" registers? - Super User
Whats the logic between MAR, MBR registers and Control Bus -
instruction cycle - Program Counter PC and Instruction Register IR - RISC/CISC ISAs - Sparc, Intel, AMD - IA-32/x86-64
Index register - Wikipedia

Memory_Caches

CPU cache - cache lines, cache blocks - Address translation - Multi level cache
Cache (computing) - Hardware Cache
definitive - cpu architecture - What does a 'Split' cache means. And how is it useful(if it is)? L1 Cache - Instruction/Data caches - Modified Harvard VS Von Neumann architecture -
What is L1 (Level 1 Caching)? primary cache
What is L2 Cache (Level 2 Cache)? external/secondary cache
Memory part 2: CPU caches - L1, L2, L3 - definitive technical in-depth explanation
How L1 and L2 CPU Caches Work, and Why They're an Essential Part of Modern Chips - ExtremeTech
cpu - How can cache be that fast? - definitive - L1 cache - Peter Cordes answer
Translation lookaside buffer - TLB - instruction translation lookaside buffer (ITLB) and a data translation lookaside buffer (DTLB) - Address-space/context/process/thread switch - Meltdown security vulnerability - kernel page-table isolation (KPTI) - memory-management unit (MMU) - translations of virtual memory to physical memory - paged or segmented virtual memory - content-addressable memory (CAM)

Arithmetic_Logical_Unit

Arithmetic logic unit - Wikipedia

Assembly_To_Hardware_Translation

Microcodes

computer architecture - How does a CPU 'know' what commands and instructions actually mean? hard-programmed microcode/microprogram control unit - interface between abstract assembly instructions and physical electric logic - Super User
Microcode - Microprogram control unit vs hardwired control unit - Wikipedia
When a computer reads binary, how does it know what to do? : askscience
Control unit - CU - hardwired control unit vs microcode/microprogram control unit - Von Nuemann Architecture

assembly - How does binary translate to hardware? - Stack Overflow
how are bytes represented on hardware at DuckDuckGo

Firmwares-Bootloaders

Boot_Process

Bootloader - Single/Two Stages/Mixed Bootloader - multi stage
How to Setup Network Bootable Utility Discs Using PXE
architecture - Do bare computer systems (without OS installed) use (executable) files? - BIOS
How Computers Boot Up - bootloader, grub, MBR, boot sector, BIOS - definitive breakdown - faulty CPU troubleshooting, diagnostics - bootstrap processor (BSP) - initial address in Instruction Pointer register EIP 0xffffff00 reset vector
What is Boot?
DEFINITIVE - Inside the Linux boot process – MBR - first/second stage bootloader
bootloader - primary and secondary boot loaders - first/second stage bootloader
android - what is the need of second stage boot loader ? why different bootloaders like first stage and second stage? multi/single stage boot process - embedded systems limitations
Reset vector - CS/IP regeister - segmented/physical address
DEFINITIVE - what is the use of SPL (secondary program loader) - definitive visual explanation, memory layout - vs First/Second Stage Bootloader - ROM code, U-Boot SPL - embedded , IoT, BIOS, MBR - static RAM vs SDRAM, DMM
TPL = Tertiary Program Loader - SPL loading SPL(and, SPL as just another U-Boot config)
linux - Why do we need a bootloader in an embedded device? - Stack Overflow
DEFINITIVE - What is the difference between a Bootrom vs bootloader on ARM systems - Boot ROM, ROM Code
boot - What is the difference between primary and secondary bootloader? - Super User
DEFINITIVE - boot - How does the CPU execute instructions stored in a motherboard's flash memory chip? - ROM code, reste vector, XIP Execute In Place - BIOS ROM - Cache-as-RAM
Boot Process - definitive - reset vector - Z80 cpu example
The Boot Process - 1) ROM Code 2) SPL (or Secondary Program Loader) 3) U-BOOT 4) Linux Kernel
Why does BIOS needs to load first stage boot loader from MBR, but this is not the case with UEFI? GPT, UEFI, first/second stage bootloader
DEFINITIVE - What memory is used for storing the reset vector? - bios, boot process
boot - What is the booting process for ARM? - Stack Overflow
ubuntu - how sabre sd boots directly from uboot without SPL - Stack Overflow

Comparison of boot loaders - syslinux, grub, lilo
bootstrap loader vs bootloader - Google Search
where does the term bootstrapping come from - Google Search
bootstrap loader vs bootloader - Google Search
firmware vs bootloader at DuckDuckGo
Firmware vs Operating System OS vs Boot loader - ROM memory, EEPROM, BIOS, flash memory
Bootloader and Firmware Common Usage and ... - Stack Overflow
bootloader - What is the difference between boot loader and ...
ttps://github.com/tuhdo/
why a cd directly bootable and a usb is not - Google Search
how is alarm kept active when smartphone is off - Google Search
How to Clear CMOS (AKA Reset BIOS Settings)
The PC BIOS will be killed off by 2020 as Intel plans move to pure UEFI | Ars Technica
What Is Meant By Firmware, Stock & Custom ROMs And Flashing [Guide]
Flashing Firmware
What is “Flashing the BIOS”? BIOS chip - BIOS update - POST Power-On-Self-Test - HDD, SSD - - Super User Blog
Booting - bootstrap loader BSL, boot sequence - first stage bootloader as coreboot, libreboot , das u-boot - second stage bootloader as grub, bootmgr, syslinux, ntldr, bootx - embedded systems booting on ROM/Flash memory - POST power on self test - secondary program loader SPL
BIOS boot partition - partition on a data storage device that GNU GRUB uses on legacy BIOS-based personal computers in order to boot an operating system, when the actual boot device contains a GUID Partition Table (GPT). Such a layout is sometimes referred to as BIOS/GPT boot
System partition and boot partition - Wikipedia
Arch boot process -In order to boot Arch Linux, a Linux-capable boot loader must be set up. The boot loader is responsible for loading the kernel and initial ramdisk before initiating the boot process. The procedure is quite different for BIOS and UEFI systems - ArchWiki
Multi-booting - Boot manager - act of installing multiple operating systems on a computer, and being able to choose which one to boot. The term dual-booting refers to the common configuration of specifically two operating systems. Multi-booting may require a custom boot loader.
Embedded Linux Booting Process (Multi-Stage Bootloaders, Kernel, Filesystem) - YouTube
A Detailed Look at the Boot Process
GNU GRUB - GNU GRand Unified Bootloader
Grub4dos tutorial - Grub4Dos Wiki - bootloader
Boot chains overview - stm32mpu - boot process - definitive in depth breadown
Configure the boot loader - MBR - BIOS - Flash memory/ROM
Basics of boot loader - definitive simple breakdown - first/second stage - boot sequence/sector - BIOS
Linux Boot process tips - BIOS, first/second stage boot loader - /boot folder/partition
How Boot Loaders Work - boot sector - LILO, GRUB - chain loading
DEFINITIVE - The Boot Process on AM335x Arm Cortex-A8 processor board - Texas Instruments Wiki - Multi stage boot process - 4 stages : ROM Code, SPL Second Program Loader, U-Boot, Kernel - Linux Kernel boot on embedded platform - POR Power On Reset
The boot process - Windows vs Linux - boot loaders
Definition of More About First-stage Boot Loaders | Chegg.com
Second Stage Boot Loader
what is the difference between these thing firmware ,boot loader and driver - firmware vs bootloader - simple explanation
DEFINITIVE - How does a boot manager work and work differently on BIOS and UEFI machine? ROM, Flash, grub, reFInd - bootloaders definition
What is the difference between a boot loader and a boot manager? - Quora
Open Firmware - EFI predecessor
arm - What are ATAGs for a device that uses Linux Kernel? - ARM Tags
boot - Are there any booting standards for ARM-based computers? - Super User - boot process
arm - How to add customised ATAG variable in U-Boot and Linux kernel? - Stack Overflow
ARM Linux and ATAGS - boot loader, devide tree file DTB
Booting ARM Linux
RAM image - ROM, embedded system, bootloader

Interrupts-System_Calls

Polling vs. Interrupt
interrupt vs system call at DuckDuckGo
In an operating system, what is the difference between a system call and an interrupt? - Stack Overflow
Interrupt - Wikipedia
linux - What is "process context" exactly, and how does it relates to "interrupt context"? context switch, cs register (code segment) - interrupt descriptor table - context switch
c - Context switching in function vs interrupt call? - isr
What is the difference between context switching and interrupt handling?
hardware - Kernel and User space System Calls - several ways of going to a higher privilege, at least three types: system calls (when user code explicitly switches to kernel mode), interrupts (when a peripheral signals the processor that it should do something), and traps (when the processor attempts to execute invalid cide, e.g. access to unmapped memory or an unknown instruction)
linux - What is difference between User space and Kernel space? - definitive - system calls - cpu rings description, Ring 0 (kernel mode), Ring 1 (may be used by virtual machine hypervisors or drivers), Ring 2 (may be used by drivers, I am not so sure about that though). Ring 3 is what typical applications run under. It is the least privileged ring, and applications running on it have access to a subset of the processor's instructions. Ring 0 (kernel space) is the most privileged ring, and has access to all of the machine's instructions - interrupt handler - examples of x86 privileged assembly instructions lgdt to load the global descriptor table or hlt to halt a processor - High/Low Memory - PAE
Interrupts - definitive — The Linux Kernel documentation
Why are System calls also called 'traps'? - PDP 11
c - How does a system call work - definitive visual explanation
microcontroller - What is the difference between context switching and interrupt handling? ISR Interrupt Service Routine
Handling Interrupts - Open Source For You

Process_Scheduling

Create Shortest Job First Scheduling Algorithm in C

Concurrency-Multithreading

Context_Switch

Context switch - Wikipedia
multithreading - What is a context switch? - Stack Overflow
do processes share same cpu registers at DuckDuckGo
process - Running multiple processes on a single CPU - Stack Overflow
linux - Why is it quicker to switch between threads than to switch between processes and share data between them? - Super User
operating systems - Does a context switch happen when a process has terminated? - Computer Science Stack Exchange
Do system calls always means a context switch? - Computer Science Stack Exchange
What is Context Switching in Operating System?
OS scheduling and The anatomy of a context switch
Tasks, the context switch, and interrupts - Embedded.com
Context switching
Interrupt handling and context switching
Context Switching - OSDev Wiki
Interrupts and Context Switching - Kaedrin Weblog
Measure the time spent in context switch? - GeeksforGeeks
Context Switch definition - mode switches - cpu
ARM Cortex-M RTOS Context Switching | Interrupt
Measuring context switching and memory overheads for Linux threads - Eli Bendersky's website
Evolution of the x86 context switch in Linux – MaiZure's Projects

multithreading vs parallel computing at DuckDuckGo
Parallel computing - Wikipedia
multithreading - How does a single thread run on multiple cores? - multithreading hardware cpu multi-core - time slice

Parallel_Computers-SIMD

SIMD - Single Instruction Multiple Data - Wikipedia
Streaming SIMD Extensions SSE - SIMD (Single Instruction, Multiple Data, pronounced "seem-dee") computation processes multiple data in parallel with a single instruction, resulting in significant performance improvement; 4 computations at once. SSE defines 8 new 128-bit registers

What's the difference between a microcontroller and a ...
Core vs CPU vs Socket vs Chip vs Processor Difference Comparison
CPU socket - Wikipedia
Processing the Page Turn | The CPU Shack Museum
Explained: What's the Difference Between Intel Core i3, i5 and i7?
Memory access and CPU cycles - For Beginners - GameDev.net
CPU Speed and Cycles? - Super User
What is the use of mutex lock for integer variables - Coding Security
This Guy Designed and Built an 8-bit CPU from Scratch - Motherboard
Intel® Software Developer Zone
memory - How does the CPU know when it received RAM data and instructions? - Software Engineering Stack Exchange
Is RAM size or processor speed more important? - Quora
What are threads, and what do they do in the processor? - Super User
z80 - How did 8 bit processors perform 16 bit arithmetic? data bus, register width - 4 bits width ALU - Retrocomputing Stack Exchange
How does a processor know how many bytes to read from memory? (and other questions) : askscience
Soft microprocessor - CPU - soft microprocessor (also called softcore microprocessor or a soft processor) is a microprocessor core that can be wholly implemented using logic synthesis. It can be implemented via different semiconductor devices containing programmable logic (e.g., ASIC, FPGA, CPLD), including both high-end and commodity variations
arm processor vs intel processor - Google Search

Buses

Bus (computing) - Wikipedia
Control bus - Wikipedia
Memory bus - Wikipedia
System bus - Wikipedia
cpu architecture - Difference between memory bus and address bus - memory bus = data bus - Stack Overflow
Address bus - Wikipedia

Data_Storage-Memories

Primary_Storage-Main_Memory

Random_Access_Memory-RAM

Memory_Management

Memory_Management_Unit

microprocessor - Role of the Memory Management Unit - Electrical Engineering Stack Exchange

Memory Management
Memory management (operating systems) - Wikipedia
Memory management unit - MMU - paged PMMU
Computer memory - types of memory : Volatile as RAM, Non-Volatile as ROM, NVRAM, etc - Wikipedia
primary memory
symbol table -- wikipedia
Memory segmentation - Wikipedia
Data segment - Wikipedia
Segmentation and paging - Memory Management - pdf - Junfeng Yang
Call stack - aka execution stack, program stack, control stack, run-time stack, or machine stack - unwinding - frame pointers
.bss - Wikipedia
computer architecture - How does CPU actually retrieve data from memory when you call a variable in a programming language? - Computer Science Stack Exchange
compilers - How do computers remember where they store things? - Computer Science Stack Exchange
What Every Programmer Should Know About Memory - cpumemory.pdf

Virtual_Memory

Virtual memory - RAM, DASD - Paged virtual memory, page tables, paging supervisor, pinned pages - thrashing - segmentation - address space swapping
Virtual Memory Tricks · Our Machinery
memory fragmentation - Google Search
Direct memory access - Wikipedia
x86 64 - Address canonical form and pointer arithmetic - mmap, virtual memory, virtual address space - Stack Overflow

Memory_Paging-Swapping

Swapping

linux - swap partition vs file for performance? - Server Fault
hibernate - swap partition vs swap file - Ask Ubuntu
swap partition vs swap file |
Ubuntu Linux: Create swap file - dd command
linux - Swap: Better to create a dedicated swap partition or to create a swap file? definitive simplest explanation
I have 16GB RAM. Do I need 32GB swap? - Ask Ubuntu
How Much Swap Should You Use in Linux? - It's FOSS

Paging - Wikipedia
operating system - Can someone explain this diagram on Paging (virtual memory) to me? - Stack Overflow
Page (computer memory) - 1 Page size trade-off 1.1 Page table size 1.2 TLB usage 1.3 Internal fragmentation 1.4 Disk access 2 Determining page size
What exactly is paging in operating systems? - Quora
memory - What is paging? - Stack Overflow
memory management - Paging - What is exactly "inside" of a Page? - Stack Overflow
operating systems - What is Paging in memory management? - Super User
What is the difference between a 'page' of memory and a 'frame' of memory? - Computer Science Stack Exchange
kernel - Does Linux not use segmentation but only paging? - Unix & Linux Stack Exchange
memory management - Is page size always equal to frame size? - Computer Science Stack Exchange
x86 Paging Tutorial - Ciro Santilli
Swap - swap file - paging, virtual memory, physical memory/RAM
memory management - Difference Swapping and Paging - Stack Overflow
What is difference between paging and swapping? - demand paging, virtual memory implementation - logical vs effective virtual memory
What is the advantage of paging over swapping? - Quora
What is the role of paging and swapping files in virtual memory management? - swapped process
What is swapping in memory management? - paging, pages
What are the advantages of swapping in memory management? - Quora
Virtual Memory - Paging or Swapping [Gerardnico]
What is the Difference Between Swapping and Paging - Pediaa.Com
Paging vs. swapping - LinuxIntro
Virtual Memory, Paging, and Swapping « Gabriele Tolomei
process - What is the difference between paging and context switching? - Unix & Linux Stack Exchange
Do we really need swap on modern systems? paging, pages - definitive - virtual memory management, overcommitment - thrashing - out of memory - how much swap, swap size
Page table - store the mapping between virtual addresses and physical addresses.- Virtual addresses are used by the program executed by the accessing process, while physical addresses are used by the hardware, or more specifically, by the RAM subsystem. The page table is a key component of virtual address translation which is necessary to access data in memory.

Memory_Models-Addressing_Schemes

memory - Flat addressing vs. segmented addressing - near/far pointers, buffer overflows, pointers within same segment vs across different segments - one segment per buffer better for security - JVM uses segmented memory model
Intel Memory Model - six different memory models of the x86 CPU - ds, cs, ss 16 bits segments - near/far/huge pointers - x86-64
Protected mode - x86 - privilege levels, rings - CPU security
Real mode - x86 CPUs - characterized by a 20-bit segmented memory address space - Wikipedia
Memory address - segment, offset - x86 memory model - physical/logical addresses
Addressing_mode
Address space - Address mapping and translation - Parallel ATA/PATA - DNS, ARP examples - virtual memory
Memory segmentation - segments/sections - with/without paging - x86 - program compilation, linking, loading - object files - process isolation for more reliability - x86-64
operating systems - Understanding "Flat memory model" and "Segmented memory model" - paged/flat
linux - Difference between flat memory model and protected memory model? - MMU
Programming with the Intel architecture in the flat memory model - segmented, protected
Paging - Wikipedia
Flat memory model - linear memory model/address space - refers to a memory addressing paradigm in which memory appears to the program as a single contiguous address space - paged memory model, x86 segmented memory model
cpu - Byte addressable vs bit addressable -
Byte addressing - memory model - addressable - byte vs octet - historical non 8 bit bytes - PDP-10
Word-addressable - word machines - vs byte
Memory address - Logical vs Physical - Word size versus address size - flat/segmented memory models - memory controller bus - address space, memory layout - Addressing schemes - byte/word adressable - memory segmentation - 64-bit address space
Offset (computer science) - relative address - displacement - base/absolute address
Base address - relative addressing scheme, absolute address
Input/output base address - x86 memory model
Memory model (programming) - race conditions
memory - Why are RAM module capacities in powers of two (512 MiB, 1, 2, 4, 8 GiB)? - Super User
memory - Why is RAM in powers of 2? - Stack Overflow
Memory Management (computer programming): Why is the size of RAM always in powers of 2? - Quora
Word (computer architecture) - word/byte addressing - memory size power of two
16-bit computing - microcode, ALU

Computer memory - Wikipedia
c - Why mmap() is faster than sequential IO? - Stack Overflow
Bank switching - vs paging
Stack-based memory allocation - LIFO - longjmp, alloca, malloc, _malloca, _freea, alloca_account - stack overflow - x86, PowerPC, MIPS - ABI
Memory management - external fragmentation - virtual memory - memory protection - shared memory in inter process communication - _malloca, malloc, _freea, alloca_account - recursion
Fragmentation (computing) - Internal/External - filesystem
Memory leak - RAII Resource Acquisition Is Initialization - shared memory - C, C++ examples
programming languages - What is actually the difference between the GNU C Library and the C standard Library? libc vs glibc - C standard, POSIX library - bypassing libc to do system calls - Bones Scheme Compiler, busybox - dlopen, fork - other implementation of the C standard library, musl-libc, dietlibc - vdso

What is a Memory Module? lternatively referred to as a memory board or memory stick. A memory module is a circuit board that contains DRAM integrated circuits that are installed into the memory slot on a computer motherboard.
How to install computer memory (RAM)
Buying tips on computer memory ( RAM) - choose right one before buying
What type of computer RAM memory to use in a memory upgrade?
What is a Memory Slot? A memory slot, memory socket, or RAM slot is what allows RAM (computer memory) to be inserted into the computer
What is SDRAM (Synchronous DRAM)?
What is DIMM (Dual In-line Memory Module)?
What is SIMM (Single Inline Memory Module)?
What is RAM (Random Access Memory)?
What is DDR?
What is DDR2 (Double Data Rate Two)?

Read_Only_Memory-ROM

Flash memory - nand type memory - EPROM, EEPROM
Programmable read-only memory - PROM - fuse/antifuse
Read-only memory - ROM - solid state
Write-only memory (engineering) - WOM - antithesis of read-only memory ROM - security, encryption - In computability theory, adding a WOM to some models of computation can increase their computational power - embedded, GPUs
EPROM - (rarely EROM), or erasable programmable read-only memory, is a type of programmable read-only memory (PROM) chip that retains its data when its power supply is switched off - non volatile
EEPROM - also E2PROM - stands for Electrically Erasable Programmable Read-Only Memory and is a type of non-volatile memory used in computers, integrated in microcontrollers for smart cards and remote keyless systems, and other electronic devices to store relatively small amounts of data but allowing individual bytes to be erased and reprogrammed - vs Flash memory for firmware - used for some security gadgets, such as credit card, SIM card, car key-less entry - Wikipedia
NOR flash replacement - definitive advantages list of flash memory for embedded systems
How is the original data written to a ROM chip? - Mask ROM, PROM, EPROM, EEPROM

Primary Memory is RAM and ROM
Random Access Memory (RAM) and Read Only Memory (ROM) - GeeksforGeeks
Types of Primary Memory in Embedded Systems - RAM vs SRAM vs DRAM, Masked ROM, EEPROM vs Flash - Hybrids - definitive comparison table

Secondary_Storage-Hard_Memories

Storage_Technologies

Samsung Outs Z-NAND's Performance; Intel's Optane On Notice
What's the difference between ATA, PATA, and IDE? - Super User
PCI IDE Controller - OSDev Wiki
Cable Key - How IDE Controllers Work | HowStuffWorks
What is IDE (Integrated Drive Electronics)? - Definition from WhatIs.com
IDE vs SATA - Difference and Comparison - Connection interfaces to HDD - IDE= Parallel ATA = PATA
What is the difference between volume and partition? - Quora
HDD vs SSD - Difference and Comparison | Diffen
Parallel ATA = PATA = Advanced Technology Attachment = IDE Integrated Drive Electronics | Interface standard for the connection of storage devices such as hard disk drives, floppy disk drives, and optical disc drives in computers - It uses the underlying AT Attachment ATA and AT Attachment Packet Interface (ATAPI) standards - - ATA Secure Erasure/deletion - Wikipedia
How Hard Drive works: Firmware on Disk Platter and PCB - CMOS, BIOS, LBA Logical Block Addressing
SCSI - Small Computer System Interface - set of standards for physically connecting and transferring data between computers and peripheral devices
IDE/PATA vs. SCSI
What is SATA (Serial AT Attachment)?
Advantages of SATA over PATA/IDE
Computer disk drive interface help and support - ATA, ATAPI, IDE/EIDE, floppy driv, RAID - motherboard
What is RAID (Redundant Array of Independent Disks)?
A floppy disk drive, also called FDD or FD for short, is a computer disk drive that enables a user to save data to removable diskettes.
What is a Flash Drive? vs jump drive - SSD, memory cards, flash memory
A hard disk drive (sometimes abbreviated as hard drive, HD, or HDD) is a non-volatile memory hardware device that permanently stores and retrieves data on a computer. A hard drive is a secondary storage device that consists of one or more platters to which data is written using a magnetic head, all inside of an air-sealed casing. Internal hard disks reside in a drive bay, connect to the motherboard using an ATA, SCSI, or SATA cable, and are powered by a connection to the PSU (power supply unit) - vs SSD
What is an Optical Disc? Alternatively referred to as a disc drive, optical media, optical storage, Optical disc drive, and optical disk, an optical disc is any media read using a laser assembly. The most common types of optical media are Blu-ray, CDs, and DVDs.
What is SSD (Solid-State Drive)? PCIe/SATA connection - flash memory - vs usb jump drive
M.2 is a connection type specification for computer expansion cards, introduced in 2014. The two major types of M.2 devices are the SATA M.2 and the significantly faster (and more expensive) PCIe M.2
Non-volatile memory/storage - NVM - secondary storage - Non-volatile data storage can be categorized into electrically addressed systems (read-only memory) and mechanically addressed systems (hard disks, optical disc, magnetic tape, holographic memory, and such) - ROM, flash, RAM - HDD - definitive breakdown
NVM Express (NVMe) or Non-Volatile Memory Host Controller Interface Specification (NVMHCIS) is an open logical device interface specification for accessing non-volatile storage media attached via a PCI Express (PCIe) bus. The acronym NVM stands for non-volatile memory, which is often NAND flash memory that comes in several physical form factors, including solid-state drives (SSDs), PCI Express (PCIe) add-in cards, M.2 cards, and other forms. NVM Express, as a logical device interface, has been designed to capitalize on the low latency and internal parallelism of solid-state storage devices
SATA 3 vs M.2 vs NVMe – SSD connections choice
NVMe vs. M.2 vs. SATA – What’s the Difference? SSD - flash memory
M.2 vs. SATA vs. PCIe (NVMe) SSDs: What’s the Difference? | Performance Computer - definitive breakdowns with pictures
SATA vs. NVMe: Should You Upgrade Your SSD System Drive? performance
Advantages of SSD over HDD - definitive comparison chart
Do I need to defrag my SSD or flash drive? defragmentation - vs Hard Drive
What is an Access Arm? Alternatively referred to as read/write head arm, head arm, or actuator arm, the access arm is in every mechanical hard drive
What is a Memory Card? Types - CF (CompactFlash), MicroSD, MMC, SD Card, SDHC Card, SmartMedia Card, Sony Memory Stick, xD-Picture Card
SCSI Vs. SATA Vs. IDE - definitive breakdown with
What is SCSI (Small Computer System Interface)? pronounces scuzzy
What is hard disk? - Definition from WhatIs.com
Hard Disk and Hard Drive Physical Components
HDD from inside: Hard Drive Main parts

Difference between RAID 0, RAID 1, RAID 5 and RAID 10 - Coding Security
Advertised vs. Actual Hard Drive Storage - discrepancy - free space mess than total capacity - decimal vs binary representation - file system formatting
EEPROM - Wikipedia
Non-volatile memory - Wikipedia

Disk_Partitioning

Partition type - (or partition ID) in a partition's entry in the partition table inside a master boot record (MBR) is a byte value intended to specify the file system the partition contains and/or to flag special access methods used to access these partitions (f.e. special CHS mappings, LBA access, logical mapped geometries, special driver access, hidden partitions, secured or encrypted file systems, etc.).
Master boot record - MBR - special type of boot sector at the very beginning of partitioned computer mass storage devices like fixed disks or removable drives intended for use with IBM PC-compatible systems and beyond
Extended boot record (EBR), or extended partition boot record (EPBR), is a descriptor for a logical partition under the common DOS disk drive partitioning system
GUID Partition Table - Wikipedia
Disk partitioning - primary/extended/logical - GUID partition table, multi/mixed-boot systems - recovery - MBR - security benefit of partionning, setuid file disabling
Partition - Debian Wiki
Partitioning - MBR/GPT GUID Partition Table - bootstrap code
DEFINITIVE - Preparing the disks - Gentoo Wiki - GPT vs MBR - fdisk, parted - btrfs RAID - LVM - partitioning scheme design guide - BIOS - creating filesystem
Primary Partition VS. Logical Drive: Their Exact Features - MBR
What is the difference between Primary and logical partition? - MBR, EBR
hard drive - What are the differences between primary and logical partition? definitive visual explanation - MBR vs GPT - active partition
Primary vs Logical partition - Unix & Linux Stack Exchange
What is the Difference Between Primary/Extended Partition and Logical Drive?
Ubuntu installation partitioning: Logical or primary? - Ask Ubuntu
Primary Partition, Logical Partition and Extended Partition (Disk Partition Basic)
What is a Logical Partition?
What is a Partition?
hard drive - Which is better for keeping data: primary partition or logical partition? - Super User
Partition table - MBRGPT, APM, BSD disklabel - Wikipedia
Partitioning - definitive - GPT vs MBR - partitionless - partionning tools fidsk, gpt fidsk, gnu parted garted,
DEFINITIVE - An Easy Way to Set Partition as Active or Inactive with MiniTool - primary vs extended vs system vs boot partition
What is the meaning of `SCSI3 (0,0,0)` in Partition disks during Ubuntu installation? - Ask Ubuntu - grub maintenance
Boot flag - 1-byte value in a non-extended partition record, within a master boot record MBR. It appears at the beginning of a partition record, as the value 0x80. A value of 0x00 indicates the partition does not have the boot flag set - Active Partition
8.14. Installation Destination Red Hat Enterprise Linux 7 - recommanded paritionning scheme for linux

Bootable_Storage

What is a Bootable Disk?

Physical_Address_Extension

Physical Address Extension - PAE - NX bit

Memory hierarchy - In computer architecture, the memory hierarchy separates computer storage into a hierarchy based on response time. Since response time, complexity, and capacity are related, the levels may also be distinguished by their performance and controlling technologies - CPU internal memory, registers/cache - main memory RAM, controller cards - online mass storage/secondary storage - offline bulk storage/tertiary storage
What is the difference between a 'page' of memory and a 'frame' of memory? - Physical Memory vs Virtual Memory - Computer Science Stack Exchange
Is-there-a-point-to-having-more-than-16gb-of-ram - Quora
What is the relationship between CPU usage and RAM? - Super User
virtual memory physical memory operating system at DuckDuckGo
Is-8GB-of-DDR4-actually-better-than-16GB-of-DDR3 -- Quora
Memory address - Wikipedia
cache memory vs ram - Google Search
Physical address - Wikipedia
c - What resides in the different memory types of a microcontroller? - .text, .rodata, .data, .bss includes auto-zero-initialized data by compiler, EEPROM, Flash memory, ROM, and NVRAM- definitive breakdown - SPI or I2C bus - uninitialized static storage variables (static and file-scope globals) zero-initialization in .bss segment - Electrical Engineering Stack Exchange
Difference Between Direct Access Memory DMA and Programmed Input/Output PIO
How Memory Is Accessed by Processors - Virtual Addresses to Physical Address translation - Paging, Page number, Offset - L1, L2, L3 Caches , Buses, Memory Controllers - DDR, DRAM, DIMM
Computer data storage - primary/secondary/tertiary/offline - volatility,mutability, random/sequential accessibility, addressability - performance, granularity - security - von neumann architecture - hierarchy storage
What is Memory? RAM, ROM

Motherboard

What is an Expansion Card? daughterboards - motherboards
What is a PC Card ? PCMCIA
How do I install an expansion card? Many types of expansion cards can be installed in a computer, including sound, video, modem, network, interface card, and others. In many cases, these expansion cards will fit in a slot in the computer called a PCI slot. However, in the case of video cards and a few others, they may fit into other types of slots, like an AGP slot or a PCI Express slot. Before purchasing and installing an expansion card, make sure you know which slots your computer has available on the motherboard
What is an ExpressCard? replaces pc card
What is an Expansion Slot? Alternatively referred to as a bus slot or expansion port, an expansion slot is a connection or port located inside a computer on the motherboard or riser card
What is a Riser Board? A riser board is a circuit board that gives a computer motherboard the option for additional expansion cards to be added to the computer
What is PCIe (PCI Express)? Originally known as 3rd Generation I/O (3GIO), PCI Express, or PCIe, was approved in July 2002 as a serial computer expansion bus standard. PCI Express was designed as a high-speed replacement for the aging PCI and AGP standards and is available in different formats.
Expansion card - expansion board, adapter card or accessory card is a printed circuit board that can be inserted into an electrical connector, or expansion slot, on a computer motherboard, backplane or riser card to add functionality to a computer system via the expansion bus.
What is an Adapter Card? An adapter card is any internal expansion card that allows the computer to communicate with another peripheral
What is a Peripheral? Alternatively referred to as an auxiliary device, a peripheral is hardware input device or output device that gives a computer additional functionality. Peripheral devices, however, are not essential for the computer to perform its basic tasks; they can be thought of as an enhancement to the user's experience.

Screens

what are touch screens made from - Google Search

Cooling_Systems

Why do mobile phone processors not have cooling fans and laptop and PC processors require cooling fans? - Quora

Reparation-Maintainance

Computer Starts then Shuts Down Immediately (1-2 Seconds) w/ Video - Systems
My Computer shuts off a few seconds after i turn it on - TechSpot Forums
Computer powers on and then immediately turns off
computer case shuts down shortly after booty at DuckDuckGo
Can I remove and put back the heatsink of my processor without reapplying thermal paste - Super User
What should be the temperature of my computer processor?
Is there a way to tell how hot my CPU is running?
How to test computer memory to determine if it's bad
How can I test for hardware failures in my computer?
Can a heatsink really go bad? (Tech Support Forum)
The Simplest Way to Monitor CPU Temperature - wikiHow
How to Fix a Computer That Turns On and Then Off
Why does my computer turn off without warning?
What is a Thermal Compound?

Broken_HDD-Clicking_Noise

How to fix a broken hard drive Beeping noise or clicking RECOVER GET DATA BACK FOR FREE! BEST TRICK - YouTube
Fix Clicking Hard Drive And Recovery Data From Your Hard Drive - YouTube
How to repair click sound on hard disk||How to repair click sound from hard drive|| - YouTube
SOLVED: Any one know how to fix clicking noise? - Western Digital Essentials HD - iFixit
How to Fix Clicking Hard Drive and Recover Data - EaseUS
What To Do When Clicking Hard Disk Sounds Strike
Why is my Hard Drive Clicking?
Clicking Hard Drive Recovery Is Difficult? Absolutely No
My Hard Drive is Clicking - Now What?

System_Time_Measurements-System_Clocks

Epoch (computing) - Wikipedia
System time - Wikipedia
Unix time - Wikipedia
How to convert epoch time to a date manually - Quora

Resources

Computer Hope's Free Computer Help
Packagecloud Blog - Posts and HOWTOs for Maven, RPM, DEB, PyPi and RubyGem users

Buying a Pre-Built Gaming PC Is Now Smarter Than Building Your Own - ExtremeTech
How to create a mainframe supercomputer - Quora
mainframe vs super computer at DuckDuckGo
super computer vs general purpose computer at DuckDuckGo
main frame vs general purpose computer at DuckDuckGo
Freestanding vs. hosted implementations | Embedded
What is the difference between a hosted and a freestanding environment specifically in C language? - Quora
programming languages - When machine code is generated from a program how does it translates to hardware level operations? microcodes - Stack Overflow
Adapter (computing) - adapter card

Operating_Systems

Platforms

Comparisons

Munich council: To hell with Linux, we're going full Windows in 2020 • The Register
Keyboard Shortcuts Everyone Must Know
Difference Between the macOS and Linux Kernels [Explained] | It's FOSS
Robolinux Lets You Easily Run Linux and Windows Without Dual Booting | Linux.com | The source for Linux information
Dartmouth Time Sharing System - operating system first developed at Dartmouth College between 1963 and 1964[1]. It was the first successful large-scale time-sharing system to be implemented, and was also the system for which the BASIC language was developed. DTSS was developed continually over the next decade, reimplemented on several generations of computers, and finally shut down in 1999 - PDP-1

UNIX-like

GNU-Linux

Linux_From_Scratch

Welcome to Linux From Scratch!
Linux From Scratch - LSF
Linux from Scratch teaches building blocks | Opensource.com

Kernel

dmesg command at DuckDuckGo

Kernel_Programming

Building_Kernel_Modules_and_Drivers

Exploring the Linux kernel: The secrets of Kconfig/kbuild | Opensource.com
https://www.kernel.org/doc/Documentation/kbuild/modules.txt
https://www.kernel.org/doc/Documentation/kbuild/makefiles.txt
What is the functional difference between kbuild and normal makefile? - Quora

Setting_Up_Environment

How to install Linux Kernel Headers on Kali Linux 2.0 (Kali Sana) - Computingforgeeks
14.04 - Do I "need" DKMS? - Ask Ubuntu
Dynamic Kernel Module Support - Wikipedia
What does DKMS do? How do I use it? - Ask Ubuntu
Dynamic Kernel Module Support - DKMS - ArchWiki
Kernel Korner - Exploring Dynamic Kernel Module Support (DKMS)
Pros and Cons of Using DKMS
Add kernel modules with DKMS | Clear Linux* Project
kernel - How do I install the virtualbox-dkms package? - Ask Ubuntu

Refs

LXR / The Linux Cross Reference
Embedded Linux, kernel, drivers, real-time, Yocto and Buildroot training
linux - How to learn kernel programming from the start? - Unix & Linux Stack Exchange
linux - Kernel Hacking Environment - Unix & Linux Stack Exchange
linux - Learning Kernel Programming - Stack Overflow
drivers - Best way to get into Kernel programming? - Unix & Linux Stack Exchange
Understanding the Linux Kernel, 3rd Edition - O'Reilly Media
Linux_Kernel_Newbies - Kernel Programming/Hacking - Linux Kernel Newbies
LKML.ORG - the Linux Kernel Mailing List Archive
Kernel Hacking Guides — The Linux Kernel documentation
The Linux Kernel official documentation — The Linux Kernel documentation

modprobe - Wikipedia
udev - Wikipedia
unix kernel hacking - Google Search
4 paths to being a kernel hacker - Julia Evans
The Linux Kernel Module Programming Guide
LKMPG/LKMPG-4.15.2.org at master · bashrc/LKMPG · GitHub
Linux Device Drivers, Third Edition [LWN.net]
Easy Intro to Linux Kernel Programming - YouTube
Manuel Schölling: Linux Kernel Development for Newbies - YouTube
Loadable kernel module = LKM
GitHub - gurugio/book_linuxkernel_blockdrv
GitHub - gurugio/linuxdeveloptip
GitHub - gurugio/caos: Calcium OS project for x86_64
GitHub - infoslack/awesome-unikernels: A list about Unikernels
Linux Kernel Hacking Free Course
What does __init mean in the Linux kernel code? - Stack Overflow
Unit Testing in the Linux Kernel | Linux Journal
What's the relationship between a Linux OS and a kernel? - Stack Overflow
What is the difference between the operating system and the kernel? - Stack Overflow
What is an OS kernel ? How does it differ from an operating system? - Stack Overflow
Linux Kernel Driver Programming with Embedded Devices | Udemy
how to develop USB kernel module at DuckDuckGo
Linux kernel - Wikipedia
Linux Kernel: How does copy_to_user work? <asm/uaccess.h>
What happens once a system call is made by a process in user space? - definitive step by step explanation - glibc wrapper function - kernel trap handler
What is the difference between user space and the kernel space? - definitive visual explanation, diagram
c - System call vs Function call - interrupt - kernel code - lic C library wrappers
Adding a New System Call — alternatives - API design - x86 - definitive
Linux Assembly HOWTO - usage example make system call without using libc , bypass libc
DEFINITIVE - How to access the system call from user-space? bypass libc to make system call - CPU mode, ring - vdso - SYSCALL macro, assembly code example
linux - What is better "int 0x80" or "syscall"? - Stack Overflow
system call - assembly - What happens if you use the 32-bit int 0x80 Linux ABI in 64-bit code? - definitive - peter cordes answer
How does System Call return data back to user space in Linux Kernel? - Quora
How the kernel differentiate between kernel virtual address (logical address) and user space virtual address in 1GiB/3GiB split in protected mode? Because in the process context, If kernel want to access the user space address, it should be mapped. Isn't it? high/low memory
What will happen if user processes could directly interact with I/O devices without using the kernel? - baremetal
What is the difference between user-space and kernel-space device drivers in Linux? - Quora
When a process makes a system call, how does the OS know which process made the call? - scheduler
Kernel System Calls - definitive visual explanation, source code samples
Anatomy of a system call, part 1 [LWN.net]
Linux Tutorial: How a Linux System Call Works - YouTube
Sysenter Based System Call Mechanism in Linux 2.6
Memory Management APIs — The Linux Kernel documentation - kmalloc
KGDB - kernel debugging

Input_Handling

Exploring /dev/input | struct input_event - with python code examples
events - How can I know which of the /dev/input/eventX (X=0..7) have the Linux input stream? - /proc/bus/input/devices
linux - /dev/input - What exactly is this? - Unix & Linux Stack Exchange
Declare Variables At First Use - coding style - placement, top of scope

Writing Portable Device Drivers | __u8, __u16, __u32, __u64, __s8, __s16, __s32, __s64
c - why is u8 u16 u32 u64 used instead of unsigned int in kernel programming - kernel programming, device driver - __u8, __u16, __u32, __u64 vs uint8_t etc
GPM (software) - General Purpose Mouse - ncurses, evdev, input module
https://www.kernel.org/doc/Documentation/input/input.txt - struct input_event - /dev/input/eventX - select() system call - evdev - input, mousedev, keybdev, usbcore, uhci_hcd, ohci_hcd, ehci_hcd, usbhid - event handlers, GPM general purpose mouse
1. Creating an input device driver — The Linux Kernel 4.14.0+ documentation
c - Accessing Keys from Linux Input Device - struct input_event, time, type, code, value - press/release - definitive example -
Linux Driver Tutorial: How to Write a Simple Linux Device Driver
Linux Inside - definitive book - Linux kernel programming, internals, bootloader, interrupt handlers, systems calls, timers, time management, clocksource, multithreading, synchronization primitives, mutex, semaphores, spinlock, seqlock, rcu, lockdep - memory managment, memblock, fixmap, ioremap, memblock, kmemcheck - data structures, doubly linked list, radix tree, bit arrays - paging, elf64n assembly, CPUID, pmsr - initial ramdisk initrd - linkers/linking process - userspace
Conceptual Architecture of the Linux Kernel - 2. System Architecture 2.1 System Overview 2.2 Purpose of the Kernel 2.3 Overview of the Kernel Structure 2.4 Supporting Multiple Developers 2.5 System Data Structures 3. Subsystem Architectures 3.1 Process Scheduler Architecture 3.2 Memory Manager Architecture 3.3 Virtual File System Architecture 3.4 Network Interface Architecture 3.5 Inter-Process Communication Architecture - VFS - IPC
rhel - What is a subsystem (for example, the netfilter subsystem)? - Unix & Linux Stack Exchange
Anatomy of the Linux kernel – subsystems - memory, process management
Linux Kernel For Newbies – Tutorials that anyone can understand !!
arm - Why Device Tree Structure (DTS) file is needed both in bootloader and kernel source code? U-Boot
Introduction to Device Trees - flattened FDT - dtb, dts - U-Boot
/dev/kmsg - kernel printk buffer
linux - what is the difference between /proc/kmsg and dmsg? - Stack Overflow
kmsg: export printk records to the /dev/kmsg interface [LWN.net]
menuconfig - make - linux kernel source compilation
Does an application purely for intranet use by employees need secure software design or to follow OWASP guidelines? - secure coding/design - abuse / misuse - definitive - defense in depth
history - Why is there a Linux kernel policy to never break user space? - BCP
Driving Me Nuts - Things You Never Should Do in the Kernel | BCP
Linux kernel coding style

Microkernel vs Monolithic - YouTube
How does Linux kernel compare to microkernel architectures? - Unix & Linux Stack Exchange
Kernel panic - to avoid security breaches/risks
Linux just got one of its biggest kernel updates yet says Linus Torvalds | ZDNet
Linux Kernel 4.12 Released with BFQ, USB Type-C Manager, Much More - OMG! Ubuntu!
With Linux, You Don't Get One Kernel of Truth... You Get Many | Software | LinuxInsider
A beginner's guide to Linux syscalls | Opensource.com
hybrid kernel vs monolithic kernel - Google Search
Hybrid kernel - Wikipedia
The Linux Kernel - Hardware Basics, Software Basics, Memory Management, Processes, Interprocess Communication Mechanisms, PCI, Interrupts and Interrupt Handling, Device Drivers, The File System, Networks, Kernel Mechanisms, Modules, Processors, The Linux Kernel Sources, Linux Data Structures, Useful Web and FTP Sites - definitive ebook

Device_Trees

Device Tree for Dummies - definitive introduction - ardware description language - compilation - kernel uImage, zImage - boot loader - ATAGS, r1/r2 register - Device Tree Blob TDB - Power.org Standard for Embedded PowerArchitecture Platform Requirements (ePAPR) - Basic Device Tree syntax - Device Tree Sourcefiles (DTS), arch/arm/boot/dts, .dtsi files - Device Tree Compiler scripts/dtc - arch/arm/boot/dts/Makefile - driver side - Kernel ABI
Device tree - Blob DTB - boot loaders - x86 based computers generally do not use device tree - used by kernel - static device tree stored in ROM - Device tree generation in early stages of booting process
DeviceTree - official Device Tree Specification Standard Comitee
Devicetree Specification · devicetree.org
Device Tree What It Is - Flattened Device Tree
Device Tree Reference - Device Tree Source Format
Device Tree Mysteries - eLinux.org
DEFINITIVE Intro to Reverse Engineering - hardware/firmware hacking/reversing - security - Tools I2C, SPI, asynchronous serial, UART, CAN, dd, binwalk, objcopy, objdump, readelf, strace, ltrace command - DTB Device Tree Blobs - JTAG/SWD, read the firmware out of the boot flash - Opening the Manufacturer Case, epoxy, potting the device, anti-tamper switches bypassing -- Embedded Linux Conference, Open IoT Summit
Device tree - stm32mpu - dts, dtsi, dtb, dtc - linux kernel, u-boot, TF-A, dt - Tools fdtdump, fdtget, dtput
Linux and the Device - The Linux usage model for device tree data - kernel doc
Device Trees, overlays, and parameters - DTS syntax, dtb - loader start.elf - Device Tree parameters - dynamic device tree - debugging - dtoverlay, dtparam, dtc, dtmerge, dtdiff commands, config.txt
Build Device Tree Blob DTB - Xilinx Wiki - Confluence

kexec = kernel execution - hotpatching/live patching - security, kernel modules signature - Only signed kernel can be booted through kexec call - UEFI secure boot
kdump (Linux) - kexec - kernel crash dumps - /proc/vmcore
Raw device - 0_DIRECT flag

Linux_System_Calls

ptrace - process trace - system call used by debuggers and code analysis tools - security /proc/sys/kernel/yama/ptrace_scope - Wikipedia
kill - system call and command wrapper - Wikipedia
exit (system call) - Wikipedia
open (system call) - Wikipedia
read (system call) - POSIX
write (system call) - Wikipedia - file descriptor
close (system call) - Wikipedia
wait (system call) - Wikipedia
exec (system call) - execl, execle, execlp, execv, execve, execvp - overlay = "recouvrement"
Fork (system call) - vfork(), rfork(), clone() system calls
DEFINITIVE - How can I find the implementations of Linux kernel system calls? userspace, kernel space - open() overload varargs - mkdir - VFS filesystem abstraction used by kernel - ext4_mkdir() - mmap memory management subsystem
linux - exec() and system() system calls - system() fork-exec()s a new shell in which the command is processed
Difference between slow system calls and fast system calls - Unix & Linux Stack Exchange
DEFINITIVE - API with no system calls - definitive simple explanation of system calls - process isolation/memory protection, MMU - kernel privileged/unprivileged mode - CPU architecture - answer of Gilles - strace, truss
kernel - What are unimplemented system calls? afs_syscall
If the kernel can sleep when handling a system call, how does execution return to the system call ? explanation of a robert love sentence

Shell

Terminal

Install terminology - A terminal with fancy Features

Shell_Scripting

What is the difference between Shell scripting and Bash Shell scripting? - Quora
Difference between single and double quotes in Bash - Stack Overflow
shell - What is the difference between the Bash operators [[ vs [ vs ( vs ((? - Unix & Linux Stack Exchange
bash - Why does parameter expansion with spaces without quotes work inside double brackets "[[" but not inside single brackets "["? - Unix & Linux Stack Exchange
linux - Difference between ${} and $() in Bash - Stack Overflow
command line - Difference between " " and ' ' in bash - Ask Ubuntu
linux - What is the difference between &> and >& in bash? - Super User
What's the difference between [ and [[ in Bash? - Stack Overflow
shell - What is the "eval" command in bash? - Unix & Linux Stack Exchange
shell - What is the difference between sourcing ('.' or 'source') and executing a file in bash? - Unix & Linux Stack Exchange
alias vs. function in bash scripts - Ask Ubuntu
In Bash, when to alias, when to script, and when to write a function? - Unix & Linux Stack Exchange
bash - Aliases vs functions vs scripts - Unix & Linux Stack Exchange
shell - How to pass parameters to an alias? - Unix & Linux Stack Exchange
shell - What is the difference between alias and export (and a function!)[BASH]? - Stack Overflow

Shell_History

maximum size bash history file at DuckDuckGo
histsize vs histsizefile at DuckDuckGo
unix - bash HISTSIZE vs. HISTFILESIZE? - Stack Overflow
Is there a maximum size to the bash history file? - Unix & Linux Stack Exchange
BashFAQ/088 - Greg's Wiki
Bash eternal history
linux - How to: Unlimited Bash/shell history? - Super User

Command_Line_Cheats

8 creepy commands that haunt the terminal | Opensource.com

Dangerous_Commands

List of dangerous shell commands
5 Deadly Linux Commands You Should Never Use
My 10 Linux and UNIX Command Line Mistakes - nixCraft

Become a Command Line Ninja With These Time-Saving Shortcuts
20 Linux commands every sysadmin should know | Opensource.com
Most useful BASH commands to master - Scripting/Programming - nixCraft Linux/Unix Forum

Dealing_With_The_Manual

TLDR pages
TLDR is what Linux man pages always should have been
How to View Colored Man Pages in Linux

Parsing_Datas-Globbing_Regexps

Regular expression - Wikipedia
sed - vs ed - Wikipedia
linux - how to extract line portion on the basis of start substring and end substring using sed or awk - Stack Overflow
Black Magic Parsing with Regular Expressions (Parsing for Pentesters: Post 2) | Pentest Armoury
Regular Expressions - sed, a stream editor
Regular Expression Library
Regular Expression Pocket Reference, 2nd Edition - O'Reilly Media
Expresso Regular Expression Tool
RegexBuddy: Learn, Create, Understand, Test, Use and Save Regular Expression
Unix / Linux Regular Expressions with SED
Regular-Expressions.info - Regex Tutorial, Examples and Reference - Regexp Patterns
How to master Regular Expressions? - Stack Overflow
How to use regular expression in sed command - Stack Overflow
The Regex Coach - interactive regular expressions
sed regular expression at DuckDuckGo
RegexPlanet: online regular expression testing for Java
Finding Diamonds in the Rough: Parsing for Pentesters: Post 1 | Pentest Armoury
F’Awk Yeah! Advanced sed and awk Usage (Parsing for Pentesters 3) | Pentest Armoury
stackoverflow.com/questions/1632113/what-is-the-difference-between-sed-and-awk
Regex tutorial for Linux (Sed & AWK) examples - Like Geeks
Kleene star - regular expression
globbing - how to handle bash * matching when there are no matches? - shopt -s nullglob
How does a shell (bash, for example) expand wildcard patterns? - globbing
shell - find(1): how is the star wildcard implemented for it to fail on some filenames? - Unix & Linux Stack Exchange
c - implementing globbing in a shell prototype - Stack Overflow
Bash Extended Globbing | Linux Journal
glob (programming) - vs regular expressions - globbing vs regexp
GitHub - begin/globbing: Introduction to "globbing" or glob matching, a programming concept that allows "filepath expansion" and matching using wildcards.
linux - Using a glob expression passed as a bash script argument - Stack Overflow
research!rsc: Glob Matching Can Be Simple And Fast Too
globs vs regexps [LWN.net]
grep - How do regular expressions differ from wildcards used to filter files - globbing
Globbing in Bash - vs regexp - sed, awk
Wildcards - globbing, regexps
Regular Expressions and shell globs
regex - What are the differences between glob-style pattern and regular expression? - Stack Overflow
files - Regular expressions VS Filename globbing - Ask Ubuntu
Globbing and Regex: So Similar, So Different | Linux Journal

What's the meaning of a dot before a command in shell? - Unix & Linux Stack Exchange
Source vs . why different behaviour? - Unix & Linux Stack Exchange
What does 'source' do? - Super User
source vs dot linux at DuckDuckGo
What is the difference between using `sh` and `source`? - Stack Overflow
bash shell: 'exec', 'eval', 'source' - definitive breakdown
What's the difference between eval and exec? - Unix & Linux Stack Exchange
Alacritty - A Fastest Terminal Emulator for Linux
console vs terminal at DuckDuckGo
shell - Difference between nohup, disown and & - Unix & Linux Stack Exchange
command is hashed meaning unix - Google Search
how to implement autocompletion for linux shell script - Google Search
A minimalist guide to tmux – Peter Jang – Medium
Search For - A bash function that harnesses the power of fzf and rg to let you edit as quickly as possible
How to Download and Extract Tar Files with One Command
How To Check Bitcoin And Other Cryptocurrency Prices From Linux Terminal?
How To Use Bash Parameter Substitution Like A Pro - nixCraft
How to use dd in Linux without destroying your disk | Opensource.com
linux - What's the difference between nohup and ampersand - Stack Overflow
Copy Shell Prompt Output To Linux / UNIX X Clipboard Directly - nixCraft
Where is the clipboard file located? - Unix & Linux Stack Exchange
30 Handy Bash Shell Aliases For Linux / Unix / Mac OS X - nixCraft
linux - Move all files except one - Stack Overflow
Setting an environment variable before a command in bash not working for second command in a pipe - Stack Overflow
In RHEL/CentOS 7, does mv actually do a cp & rm on the same filesystem? - system calls
filesystem - How does linux handle a move command - internally
mv command - linux
file - How "rm" command in Linux works? - internally - strace -
Remove files with names containing strange characters such as spaces, semicolons, and backslashes in Unix - rm command
shell - How do I delete a file whose name begins with "-" (hyphen a.k.a. dash or minus)? - rm command
Perform Multiple Operations in Linux with the 'xargs' Command - Make Tech Easier
The Unix Shell: Finding Things - How can I find files? How can I find things in files? - Use grep command to select lines from text files that match simple patterns - Use find command to find files whose names match simple patterns.
Use the Unix find command to search for files
How do I master the UNIX find command? - Server Fault
Mastering file searches on Linux | find
find command (Unix) - Wikipedia
bash - cp command to exclude certain files from being copied - rsync
bash - Copy folder recursively, excluding some folders - rsync
linux - How to use 'cp' command to exclude a specific directory? - rsync
Which are (bash) shell special parameters? - definitive - $*, $@, $#, $?, $-, $$, $!, $0, $_
bash - How to exclude a folder when using the mv command - Ask Ubuntu
Understanding ls output - Stack Overflow
bash - When do we need curly braces around shell variables? brace/variable expansion - dollar
bash - Explanation of colon operator in ": ${foo=value}" - Stack Overflow
What does ":" (colon) operator in a bash variable expansion: VAR=${TEMP:3}? ${var:pos:len} means that the variable var is expanded, starting from offset pos with length len - not in POSIX shells, only bash and ksh
Parameter expansion [Bash Hackers Wiki] - substring removal - definitive
command line - Why does `type which` say that `which is hashed`? bash, shell -
bash - How to loop through a directory recursively to delete files with certain extensions - bash for
Bash Parameter Expansion | Linux Journal
An introduction to parameter expansion in Bash | definitive
grep - globally search a regular expression and print - unix command - PDP 11 assembly
ed (Unix interactive text editor) - VS sed stream editor Wikipedia

Linux_Boot_Process-Firmwares

LinuxBoot for Servers: Enter Open Source, Goodbye Proprietary UEFI | It's FOSS
An introduction to the Linux boot and startup processes | Opensource.com
Lesson. 0: Understanding the RISC-V Ecosystem & Booting Your First Kernel – So, you want to write an Operating System in Rust?
LinuxBoot
LILO (boot loader) -LILO (Linux Loader) is a boot loader for Linux and was the default boot loader for most Linux distributions in the years after the popularity of loadlin. Today, many distributions use GRUB as the default boot loader, but LILO and its variant ELILO are still in wide use. Further development of LILO was discontinued in December 2015 - grub
SYSLINUX - isolinux, pxelinux, extlinux
Syslinux is a collection of boot loaders capable of booting from drives, CDs, and over the network via PXE. Some of the supported file systems are FAT, ext2, ext3, ext4, and uncompressed single-device Btrfs.
What is the difference between SYSLINUX and GRUB? - Quora
grub2 - What is the difference between GRUB and SYSLINUX? - Ask Ubuntu
How to View, Modify and Recreate initrd.img
linux - how to add application to initrd.gz - Unix & Linux Stack Exchange
5.1. Booting the Installer on 64-bit PC - lilo, grub, loadlin
Linux initial RAM disk (initrd) overview – IBM Developer
Initial ramdisk - initrd - boot process - vs initramfs
Using the initial RAM disk (initrd) — The Linux Kernel documentation
linux - What is vmlinuz and why do I care? - kernel replacement attack
boot - Is vmlinuz and bzImage really the same? kernel images
Anatomy of the initrd and vmlinuz (Open Diary – Munshi Hafizul Haque (SazaL))
kernel - Can i remove /initrd.img and /vmlinuz in root? - grub.cfg
vmlinux - On Linux systems, vmlinux is a statically linked executable file that contains the Linux kernel in one of the object file formats supported by Linux, which includes ELF, COFF and a.out. The vmlinux file might be required for kernel debugging, symbol table generation or other operations, but must be made bootable before being used as an operating system kernel by adding a multiboot header, bootsector and setup routines - bzImage - Gentoo
System.map - In Linux, the System.map file is a symbol table used by the kernel. A symbol table is a look-up between symbol names and their addresses in memory. A symbol name may be the name of a variable or the name of a function. The System.map is required when the address of a symbol name, or the symbol name of an address, is needed. It is especially useful for debugging kernel panics and kernel oopses. The kernel does the address-to-name translation itself when CONFIG_KALLSYMS is enabled so that tools like ksymoops are not required
Booting ARM Linux - definitive kernel doc break down
Linux startup process - initrd, intramfs - bootloaders GRUB, LILO, SYSLINUX or Loadlin - init systems systemd, upstart
Dual boot with Windows - ArchWiki
What is the difference between GRUB and the Windows bootloader? - Quora
DEFINITIVE - Analyzing the Linux boot process | device tree, dtb - initrd intialramdisk

Filesystem

Files_Permissions

setuid - security issues if process is vulnerable to e.g buffer overflow - Wikipedia
CS360 Lecture notes -- The Setuid bit, passwd, time
Sticky bit - Wikipedia
User identifier - euid/Effective User Identifier, suid/Saved User Identifier, ruid/Real User Identifier - Wikipedia
umask - Wikipedia
Group identifier - Wikipedia
Process identifier - Wikipedia
chmod - Wikipedia
File system permissions - setuid, setgid, and sticky bits - s, S, t - Wikipedia
Privilege revocation (computing) - Wikipedia
Privilege separation
setuid permissions at DuckDuckGo
cis.rit.edu/class/simg211/unixintro/Access_Permissions.html
sudo - substitute user do - unix command- Wikipedia
sudoer file unix site:cyberciti.biz - Google Search
What is SUID and how to set SUID in Linux/Unix? - The Linux Juggernaut
10 Useful Sudoers Configurations for Setting 'sudo' in Linux
Take Control of your Linux | sudoers file: How to with Examples
Superuser - Wikipedia
su (Unix) - Wikipedia
RootSudo - root password not set in ubuntu - root account locked - sudo vs su security scheme - sudo -i vs sudo su - vs sudo -s vs sudo su - definitive breakdown - Reset sudo timeout - Downsides of using sudo - graphical sudo - add user - Enable/Disable your root account - bootloader, privilege escalation, malicious init replacement - sudoers
Fix Broken Sudo - /etc/sudoers

Filesystem_Hierarchy_Standard

Filesystem Hierarchy Standard
Why are Linux programs spread across the filesystem when they are installed?
Filesystem Hierarchy Standard
Filesystem Hierarchy Standard - Wikipedia
Operating System | Unix File System - GeeksforGeeks
An Overview of the Unix Filesystem - Understanding the Linux Kernel, Second Edition [Book]
/root is the root user's home directory
directory structure - What is this folder /run/user/1000? - Unix & Linux Stack Exchange
Linux directory structure: /lib explained - The Linux Juggernaut

Architecture-Inodes_and_links

Symbolic link - Wikipedia
Hard link - directories - across file system, volumes
Ln (Unix) - Wikipedia
symbolic links linux at DuckDuckGo
Create a symbolic link in Unix
What is a hard and symbolic (soft) link in Linux or Unix? - nixCraft
What is the difference between a hard link and a symbolic link? - Ask Ubuntu
What is the difference between a hard link and a symbolic link?
unix - What is the difference between a symbolic link and a hard link? - Stack Overflow
DEFINITIVE - Is the file table in the filesystem or in memory? inode tables : in-memory/on-disk, open file table per process, data block - fseek - file descriptor - st_nlink, st_ctime - stdin, stdout, stderr - device file tty - modprobe
Why isn't it possible to create hard links across file system boundaries? - nixCraft
rhel - What's the difference between a hard links and copied files? - Unix & Linux Stack Exchange
hard link - Is there a difference between hardlinking with cp -l or ln? - Unix & Linux Stack Exchange
inode - vs vnode in BSD systems
Chapter 3: UNIX File System Basics - inodes - definitive guide - superblock
The File system - ext2 - virtual file system - definitive - inodes - superblocks
linux - How are directory structures stored in UNIX filesystem? - inodes - superblock
Where are filenames stored on a filesystem? - Directory's structure - filename/inode number pairs - Unix & Linux Stack Exchange
Why are hard links to directories not allowed in UNIX/Linux? - directory vs file vs inode - Unix & Linux Stack Exchange
Understanding Virtual Nodes (V-nodes) - vs inodes
operating system - Inode vs Vnode Difference - Stack Overflow
The Kernel File System Tables | The HP-UX Kernel: Basic Organization - virtual file system - inode cache - buffer cache
How to tell which file is original if hard link is created - hardlink vs filename - definitive
linux - How can you see the actual hard link by ls? - Super User
The number of hard links in ‘ls -l’ - directory - definitive
ls - Why does a new directory have a hard link count of 2 before anything is added to it? - Unix & Linux Stack Exchange
filesystems - Why are hard links to directories not allowed in UNIX/Linux? definitive break down - inode, file vs file names vs directory - file system directed acyclic graph structure - du command - loops
filesystem - Why are hard links not allowed for directories? readlink, loops - definitive - copy on write cow
DEFINITIVE - Understanding Hard and Soft Links on Linux – file system layers - storage design - definitive visual explanation - fragmentation, fragmented files - inodes - filenames - dangling symbolic link - copy vs hard link
Soft and Hard links in Unix/Linux - GeeksforGeeks
Why are hard links only valid within the same filesystem? - across/span filesystems, volumes, partitions - hard link vs soft link - definitive answers
Hard Link and Symbolic Link?? - megha mohan - Medium
DEFINITIVE - ln -s vs mount --bind - hard link vs soft link filesystems/partition/volume span/crossing definitive explanation - across filesystems

Meaning of "b" and "c" in file privileges description (output of ls -l) - Ask Ubuntu
ls -l explained
Linux Standard Base - LSB - Linux ABI - Wikipedia
clearing orphaned inode linux at DuckDuckGo
opensource.com/article/17/6/linking-linux-filesystem?sc_cid=70160000001273HAAQ
An introduction to Linux's EXT4 filesystem | Opensource.com
Managing devices in Linux | Opensource.com
A high-level discussion of Linux filesystem concepts | Opensource.com
A Linux user's guide to Logical Volume Management | Opensource.com
Everything is a file | Opensource.com
linux file descriptor tutorial - Google Search
Understanding Linux filesystems: ext4 and beyond | Opensource.com
How does Linux identify file types without extensions? And why can't Windows do so? - Quora
macos - What's the difference between ln -s and alias? - Stack Overflow
Unix low-level file operations
UNIX File System
Unix filesystem - Wikipedia
Unix file types - Wikipedia
filesystem name space
Everything is a file - Wikipedia
Why is everything on Linux or Unix a file? I need a detailed explanation. - Quora
Difference between cp -r and cp -a - Unix & Linux Stack Exchange
command line - How can I copy a file to a new location, creating the directory as well - Ask Ubuntu
fstab - Wikipedia

Metadata

file metadata unix at DuckDuckGo
filesystems - What is metadata, and how does it aid in the "fsck" process? - Unix & Linux Stack Exchange
linux metadata - pdf Columbia University

linux - What is .Trash and .Trash-1000? - Super User
Virtual file system - VFS - Virtual Filesystem Switch - specifies an interface (or a "contract") between the kernel and a concrete file system - Wikipedia
Linux File System and Kernel Version Explained
How to format a usb drive with FAT32 file system on Linux

Init_Systems

5 Best Modern Linux 'init' Systems (1992-2015)
systemctl vs service vs initctl at DuckDuckGo

Resources_Administration

cpu architecture - Is there a system command, in Linux, that reports the endianness? - Unix & Linux Stack Exchange
central processing unit - How to tell if a Linux system is big endian or little endian? - Server Fault
lsb_release vs uname at DuckDuckGo
uname - Unix name command - Wikipedia
Echoes: 'uname -a' Explained
unix - explain uname -a command on linux? How to find vender's name of OS? - Stack Overflow
Linux Commands — uname with examples - abclearn - Medium

Inter-Process_Communication-Input_Output

dbus vs socket at DuckDuckGo
dmesg vs dbus at DuckDuckGo
dbus
Unix: confusing use of the Tee -command - Stack Overflow
shell - Difference between 2>&1 > output.log and 2>&1 | tee output.log - Unix & Linux Stack Exchange
tee (command) - T splitter redirection functionnalities - Wikipedia
bash - What does "< <(cmd args)" mean in the shell? - Stack Overflow
command line - What's the difference between <<, <<< and < < in bash? - <() - Ask Ubuntu
command line - "/dev/fd/63 No such file or directory" - Ask Ubuntu
bash - Why is there a "/dev/fd/63" in the output of "echo 123 >(cat)"? - Unix & Linux Stack Exchange
linux - What exactly is <() in bash (and =() in zsh)? - process substitution - Super User
Inter-process communication - IPC - Different Approaches - Synchronization - definitive comparative table - monolithitic vs micro/nano kernel - file, signal/asynchronous system trap, socket vs unix domain socket, message queue, anonymous pipe, named pipe, shared memory, mesage passing, memoy-mapped file
Local Inter-Process Communication LPC - Local Procedure Call or Lightweight Procedure Call - internal, undocumented inter-process communication facility provided by the Microsoft Windows NT kernel for lightweight IPC between processes on the same computer. As of Windows Vista, LPC has been rewritten as Asynchronous Local Inter-Process Communication (ALPC, often also Advanced Local Procedure Call) in order to provide a high-speed scalable communication mechanism required to efficiently implement User-Mode Driver Framework
Shared memory - Interprocess communication - Wikipedia
Process substitution - form of IPC inter-process communication - Wikipedia
Unix domain socket - IPC Inter-Process Communicaton Socket - Wikipedia
Comparing Unix/Linux IPC - comparison
D-Bus = Desktop Bus - software bus, an inter-process communication (IPC), and a remote procedure call (RPC) mechanism that allows communication between multiple computer programs (that is, processes) concurrently running on the same machine - libdbus
D-Bus - broker , libdbus
D-Bus - USE flags
What is the underlying transport for D-Bus?
D-Bus Tutorial - official doc
D-Bus Specification - official doc
what dbus performance issue could prevent it from embedded system? - IoT
Which Linux IPC technique to use? comparison
D-Bus optimizations – Rodrigo Moya
D-Bus optimizations II – Rodrigo Moya
D-Bus FAQ - official doc
About performance of D-Bus
Speeding up D-Bus
D-Bus Broker Announced As A New, High Performance Message Bus - Phoronix
The Slothful Ways of D-Bus - will-thompson-dbus-performance.pdf
Asynchronous System Trap - signals - re-entrant
dbus at DuckDuckGo
dbus protocol security aspects - Google Search

Job_Scheduling

How To Schedule Jobs in Linux | Cron and Crontab Commands
How to use cron in Linux | Opensource.com
Scheduling Tasks with Cron Jobs
Process Schedulers in Operating System - GeeksforGeeks
Scheduling (computing) - Wikipedia

Disks_Management

command line - How to create a bootable Ubuntu USB flash drive from terminal? - Ask Ubuntu
boot - How to create a bootable USB with multiple ISO images in it - Ask Ubuntu
dd (Unix command) - Data Definition
filesystems - How should I format a USB prior to writing an ISO to it?
Linux dd command explained for beginners (8 examples)
partitioning - Do you need to format a flash drive before dd an image to it? - Super User
usb creator - How can I create a Windows bootable USB stick using Ubuntu? - Ask Ubuntu
How to burn a Windows .iso to a USB device? - Ask Ubuntu
Create A Bootable Windows 7 USB Drive From Linux (Tested On Ubuntu) - unetbootin
Create a Bootable Windows 7 or 10 USB Drive in Linux
Create a Bootable Windows 10 USB in Linux With Ubuntu/Debian GUI - nixCraft

Configuration_Systems

dconf at DuckDuckGo
equivalent of registry on linux at DuckDuckGo
Linux equivalent of Windows Registry - Super User
terminal - What is the Linux equivalent of the Windows registry? - Unix & Linux Stack Exchange

Search_Tools

The best Linux desktop search tools | TuxRadar Linux
linux search tool content - Google Search
linux - How to search contents of multiple pdf files? - Stack Overflow
linux - What are alternative tools for searching files in full content? - Unix & Linux Stack Exchange

Package_Management

How to Convert From RPM to DEB and DEB to RPM Package Using Alien
Difference Between apt and apt-get Explained
Why use apt-get upgrade instead of apt-get dist-upgrade? - Ask Ubuntu
apt - What is "dist-upgrade" and why does it upgrade more than "upgrade"? - Ask Ubuntu
software installation - How do I install a .deb file via the command line? - Ask Ubuntu
How to Exclude Specific Package from apt-get Upgrade
executable - How do I list commands a package provides? - Ask Ubuntu
command line - How can I know what programs some apt-get package contains? - Ask Ubuntu
How do I find the package that provides a file? - Ask Ubuntu
linux - Command to find the source package of a binary? - Super User
linux - How to find which package certain command belongs to on CentOS? - Super User
`apt-get update` cannot find Ubuntu servers - Ask Ubuntu
package management - Difference between .deb files and .run file - Unix & Linux Stack Exchange
5 reasons why a Debian package is more than a simple file archive
What is the difference between deb packages and tar balls ? What are the advantages/disadvantages of each? - Ask Ubuntu
package management - Easily unpack DEB, edit postinst, and repack DEB - edit control file deb package - Unix & Linux Stack Exchange
deb content meaning control data - Google Search
5. Control files and their fields — Debian Policy Manual v4.3.0.1
Linux dpkg command cheat sheet for Debian and Ubuntu sysadmins
How can you completely remove a package? apt purge - Ask Ubuntu
package management - How to undo apt-get autoremove - restore
Using a file to install packages with apt-get - Unix & Linux Stack Exchange
Package manager - source-based distribution
List of software package management systems - Portage, emerge as hybrid systems, USE flags
ebuild - USE flags
The evolution of package managers | Opensource.com
Portage - Gentoo Wiki - source based package management
Portage (software) - source based package management - Gentoo Linux, Chrome OS, Sabayon, and Funtoo Linux - meta distribution - Package Manager Specification project (PMS) - emerge, ebuild, USE flags, ufed editor
Snap documentation | Snapcraft documentation
Snappy (package manager) - canonical ubuntu - snapcraft
What is the difference between apt-get update and upgrade? - Ask Ubuntu
uninstall - What does it mean "Processing Triggers for..." after installing/Uninstalling? - Ask Ubuntu
DpkgTriggers - Debian Wiki
Trying to make dpkg triggers more useful and less painful

Networking

Deprecated Linux Networking Commands and Their Replacements
What is the difference between netstat and netcat (nc)? - Quora
Difference Between Telnet and SSH (With Comparison Chart) - Tech Differences
telnet vs rsh at DuckDuckGo
Please use Secure Shell (SSH) instead of Telnet or rsh/rcp/rlogin
https://access.redhat.com/sites/default/files/attachments/rh_ip_command_cheatsheet_1214_jcs_print.pdf
ifconfig vs ip addr at DuckDuckGo
Linux disables ethernet auto-negotiation on plugging-in the cable? - Unix & Linux Stack Exchange
dhclient - Linux / Unix Command
sys class net unix at DuckDuckGo
An introduction to using tcpdump at the Linux command line | Opensource.com
Web Server Guides for Linux Beginners
opensource.com/article/17/4/build-your-own-name-server?sc_cid=70160000001273HAAQ
4 Ways to Speed Up SSH Connections in Linux
Netcat - backdoor - nmap's ncat - copy with ssh session vs scp
Use Netcat - not Telnet - to test network connectivity
Stop using telnet and start using netcat – vs nmap
Using DD Over Netcat vs SSH [Wiki] | NDCHost
Connectivity testing with Ping, Telnet, Tracert and PathPing:
networking - What is the difference between ping and tracert? - Server Fault
Common Linux network tools - ping, telnet, netstat and arp
linux - What is the difference between curl, wget and telnet commands? - Super User
Difference between PuTTY and Telnet | PuTTY vs Telnet
putty vs ssh at DuckDuckGo
Bash (shell): What are the differences between host, dig, and nslookup, and when should I use each? - Quora
linux - How can I get my external IP address in a shell script? - Unix & Linux Stack Exchange
Learn advanced SSH commands with the new cheat sheet | Opensource.com
ip - How to find out if Ubuntu is using DHCP (Ubuntu 12.04 LTS GUI) - Unix & Linux Stack Exchange
How can I setup the MTU for my network interface? - nixCraft
/etc/network/interfaces Ubuntu Linux networking example - nixCraft
network - How can I use netcat like ping? - Information Security Stack Exchange
Linux ip Command Examples - nixCraft
Can't ping other machines in my network - Super User
networking - How to see incoming IPs in Linux? - Server Fault
networking - Why can't I ping any computers on the same hub? - Super User
mask networking what is it for at DuckDuckGo
How TCP backlog works in Linux - listen syscall, SYN/ACK
DEFINITIVE - TCP connection SYN backlog, socket backlog queues - overflowing, half open connections - filling socket backlog - technical steps with netstat, netcat, lsof and tcpdump - SYN_RECV, ESTABLISHED states - kernel, application interactions - accept(2), listen(2) system calls - SYN Flood DDoS Attack
Magic cookie - Wikipedia
route (command) - routing table
Understanding Routing Table - nixCraft
networking - Understanding Routing table entry - Stack Overflow
How to View the Network Routing Table in Ubuntu - route -n, ip route, netstat -rn commands
An introduction to Linux network routing | Opensource.com
traceroute - tracert
How to Find The IP Address Of A DHCP server | /var/lib/dhcp/dhclient.lease
How do I find out my DHCP server address? - /var/lib/dhcp/dhclient.leases
Domain name resolution - DNS, /etc/resolv.conf, /etc/hosts - NSS, getent, - ArchWiki
Name Service Switch - NSS - /etc/passwd, /etc/group, /etc/hosts - DNS, NIS, LDAP - nsswitch.conf -
How to Setup Local DNS Using /etc/hosts File in Linux - name service switch /etc/nssitch.conf -
filesystem - What is the use of /etc/hosts? - DNS Lookup
DEFINITIVE - What is the purpose of /etc/hosts? - historical context - vs DNS - priority in /etc/nsswitch.conf
https://someonewhocares.org/hosts/hosts - example of /etc/hosts file on linux - blacklist
Managing DNS locally with /etc/hosts | definitive advises - pros/cons - host/nslookup commands - scale - load balancer
/etc/resolv.conf - DNS resolver on linux - dhcp, resolvconf
resolvconf - DNS
How to take back control of /etc/resolv.conf on Linux | NetworkManager, resolvconf, rdnssd, netconfig
/etc/resolv.conf - Linux Shell Scripting Tutorial - A Beginner's handbook
DEFINITIVE - The Non-complexity of /etc/nsswitch.conf - myhostname
ubuntu - Why do I need to change the order of hosts in nsswitch.conf? - Multicast DNS - .local domains
Why is the root directory on a web server put by default in "/var/www"? - Unix & Linux Stack Exchange
linux - What is the recommended directory to store website content? - Super User
dig (command) = Domain Information Groper - supersedes older tools as nslookup, host - belongs to BIND - DNS - resolv.conf, DNS root zone - supports Internationalized domain name (IDN) queries.
nslookup = Name Server Lookup - host, dig - DNS query
host (Unix) - DNS lookups - FQDN
10 Linux nslookup Command Examples for DNS Lookup - definitive explanation server vs name non authoritative answer - MX mail exchange server record
NSlookup for Beginners - TechNet Articles - United States (English) - TechNet Wiki
networking - Understanding results of nslookup - Ask Ubuntu
linux - NSLookup how to interpret output - Unix & Linux Stack Exchange
Linux and Unix dig Command Examples - nixCraft
8 Linux Dig (Domain Information Groper) Command to Query DNS
domain name system - DNS - NSLOOKUP what is the meaning of the non-authoritative answer? - Server Fault
utilities - What is the difference between curl and wget? - Unix & Linux Stack Exchange
curl vs Wget
downloads - What is the difference between curl and wget? - Ask Ubuntu
What is the difference between curl and wget below? - Stack Overflow
wget vs curl - Google Search

Power_Management

How can I suspend/hibernate from command line? - Ask Ubuntu
How does the system shutdown of a linux kernel work internally? - Unix & Linux Stack Exchange
reboot - How does a computer restart itself? - definitive answer ACPI, soft power, ATX, standby power supply, AT power, , hard power, PS_ON, PS_RDY - power control - power states - reset - motherboard
linux - "reboot" vs "shutdown -r now": what restart command is safer? - Server Fault

Graphical_Environments

xorg - What is the X server? - Ask Ubuntu
freedesktop.org - xdg - X Desktop Group formerly - Wikipedia
software installation - What is gdm3, kdm, lightdm? How to install and remove them? - Ask Ubuntu
display manager - What is LightDM and GDM - Unix & Linux Stack Exchange
X display manager (program type) - Wikipedia
Difference between Gnome3 and Gnome-shell - Unix & Linux Stack Exchange
GitHub - GNOME/mutter: Window and compositing manager based on Clutter
Is there a simple linux command that will tell me what my display manager is? - Unix & Linux Stack Exchange
X Window System - Wikipedia
X.Org Server - xserver, x display/window server - ddx, xrandr - Wikipedia
xorg - How to forward X over SSH to run graphics applications remotely? X Forwarding, xauth, client ~/.ssh/config, server /etc/ssh/sshd_config - Unix & Linux Stack Exchange
xorg - Why .Xauthority needs not to be owned by the root account in order to get past login? - security - key loggers - Unix & Linux Stack Exchange
filename - Keyboard Shortcut to Rename File in GUI (Other Than F2) - Gnome Nautilus config file/ shortcut file - Ask Ubuntu
Kernel Mode Setting (KMS) is a method for setting display resolution and depth in the kernel space rather than user space. The Linux kernel's implementation of KMS enables native resolution in the framebuffer and allows for instant console (tty) switching. KMS also enables newer technologies (such as DRI2) which will help reduce artifacts and increase 3D performance, even kernel space power-saving.
Kernel Mode Setting (KMS) — Linux GPU Driver Developer Guide
Mode setting is a software operation that activates a display mode (screen resolution, color depth, and refresh rate) for a computer's display controller. In kernel mode-setting (KMS), the display mode is set by the kernel. In user-space mode-setting (UMS), the display mode is set by a userland process. Kernel mode-setting is more flexible and allows displaying of an error in the case of a fatal system error in the kernel, even when using a user-space display server. User-space mode setting would require superuser privileges for direct hardware access, so kernel-based mode setting shuns such requirement for the user-space graphics server.
Direct Rendering Manager (DRM), a subsystem of the Linux kernel, interfaces with the GPUs of modern video cards. DRM exposes an API that user-space programs can use to send commands and data to the GPU, and to perform operations such as configuring the mode setting of the display. DRM was first developed as the kernel space component of the X Server's Direct Rendering Infrastructure, but since then it has been used by other graphic stack alternatives such as Wayland. User-space programs can use the DRM API to command the GPU to do hardware-accelerated 3D rendering and video decoding as well as GPGPU computing
The DRM/KMS subsystem from a newbie's point of view - brezillon-drm-kms.pdf
KernelModesetting - KMS

Media_Management

Distros_Comparison

Debian vs Redhat - Best linux distro war - Coding Security
List of Linux distributions that run from RAM - ram required to run them - Puppy Linux
10 Best Lightweight Linux Distributions for Older Computers in 2019 [With System Requirements] - Puppy Linux
Puppy Linux - Support
Fatdog64 Linux
Puppy Linux - Wikipedia
Light weight Linux distribution - Wikipedia
Installing Arch Linux from scratch
Why is Arch Linux so challenging? What are the pros and cons of using it? - Quora
Should You Install Arch Linux? 10 Reasons for Arch-Based Distros
Arch Linux: Letting You Build Your Linux System From Scratch
Puppy Linux Installation and Usage - booting - SFS Squash Filesystem package
Puppy Linux Supported Architectures - bios, uefi - PAE
Definitive Breakdown Puppy Linux Internals - how it works - initrd.q, q.sfs, init script, boot partition, performance measurements, recovery and maintenance, version control, layered f.s and switch_root mounting - containers, home, repository - upgrade
Puppy Linux Frequently Asked Questions (FAQ)
Frugal or Full Installation: PuppyLinux
Linux Directory Structure (RootFS): PuppyLinux - /etc/fstab
Installer Puppy Linux - Les Hirondelles Du Net
How to install Puppy Linux (frugal) and configure Grub2 bootloader - Linux How-To and Tutorial Section
How to do a Frugal Puppy Linux 4.3.1 Install to a new Hard disk | MyLinuxRamblings
Puppy Linux Wiki: PuppyLinux - resources - reference - documentation - docs
How to install VirtualBox Guest Additions in Puppy Linux 4.0 | 中文Puppy Linux开发者之家
Gentoo Linux - meta distribution - Portage package management system
Gentoo Wiki

Certifications

Troubleshooting

Repairing_grub

dual boot - How can I repair grub? (How to get Ubuntu back after installing Windows?) - Ask Ubuntu
grub rescue vs grub - Google Search
boot - GRUB rescue problem after deleting Ubuntu partition! - Ask Ubuntu
grub2 - How do I fix "Grub Rescue"? Uninstallation? - Ask Ubuntu
boot - grub rescue -> no such partition - Ask Ubuntu
boot - error: file '/grub/i386-pc/normal.mod' not found - Ask Ubuntu

How to backup settings and list of installed packages - Ask Ubuntu
How to Connect Wi-Fi from Linux Terminal Using Nmcli Command
memory - How to find L1, L1i, L1d cache from dmidecode output? - CPU

Misc

How can I extract a page range / a part of a PDF? - Ask Ubuntu
linux - Merge / convert multiple PDF files into one PDF - Stack Overflow

Refs

The Linux Documentation Project
Index of /class/simg211/unixintro
Welcome to LWN.net [LWN.net] -- Linux Weekly News
Home | Linux Journal
The Linux Information Project (LINFO) Home Page
Learn Linux - slashroot

ubuntu for phones review - Google Search
5 Reasons to Switch to Ubuntu Phone
DIY: Create multi-boot USBs with ease - TechRepublic
How To Run Any Android Apps On Linux OS
​Linux totally dominates supercomputers | ZDNet
Using rsync to back up your Linux system | Opensource.com
A very simple example of the flexibility and philosophy of Linux
A Linux Sysadmin's Guide to Network Management, Troubleshooting and Debugging
Linux Distros On Smartphone: The First "Linux On Galaxy" Demo Is Here
30 Linux System Monitoring Tools Every SysAdmin Should Know - nixCraft
How to run DOS programs in Linux | Opensource.com
Analyzing the Linux boot process | Opensource.com
10 command-line tools for data analysis in Linux | Opensource.com
Enable Debugging Mode in SSH to Troubleshoot Connectivity Issues
Quick Reference Guide Scientific Linux for DESY

Process_Management

Process_Environment

Linux: where are environment variables stored? in process own memory, above process command line arguments list - Kernel make them available in virtual file /proc/<pid>/environ - Stack Overflow
12.04 - Environment variables - where are they stored by linux, how do I change them and is it safe to do so? Global VS User environment variables - Ask Ubuntu
bash - What does "export" do in shell programming? - Stack Overflow
Environment variable - Wikipedia
How to permanently set environmental variables - Login/Non-login shell Interactive/Non-interactive shell - minimal environment loaded by shell - bash - /etc/profile, ~/.bash_profile, ~/.bash_login, ~/.profile, ~/.bashrc, BASH_ENV
bash - How to determine where an environment variable came from - Unix & Linux Stack Exchange
How To Read and Set Environmental and Shell Variables on a Linux VPS | DigitalOcean
setenv() — Add, delete, and change environment variables - #define _POSIX1_SOURCE 2 - #include <env.h> - int setenv(const char *var_name, const char *new_value, int change_flag)
Linux Environment Variables – Local vs Global environment variable
bash - What exactly is an environment variable? environment definition - execve() - Unix & Linux Stack Exchange
getenv(), getenv_s() - cppreference.com
linux - Where is $BASH_ENV usually set? bash environement - PAM, sshd - Bash profiles config files
sshd - Sourcing BASH_ENV for non-interactive SSH commands - Unix & Linux Stack Exchange
bash - Environment variable assignment followed by command - definitive explanation by cuonglm - environment variable passing to the process created by command execution - equivalent to exporting variable
posix - Is it shell portable to run a command on the same line after variable assignment? environment variables

File_descriptors

kernel - How can same fd in different processes point to the same file? - file descriptor
File descriptor - definitive visual explanation - TOCTTOU attacks - FD, fildes - table - /proc/<pid>/fd - fcntl() - F_GETFD, F_SETFD, F_GETFL and F_SETFL - mmap(), bind(), connect(), listen() accept() (creates a new file descriptor for an incoming connection) getsockname() getpeername() getsockopt() setsockopt() shutdown() - capabilities - file descriptors table per process, file table, inode table
linux - C fopen vs open - definitive
fopen and open - creat system calls
fopen() — Open a file
How do I clear the whole contents of a file in C? empty up

Process Table - context block - PCB
What is the linux process table ? What does it consist of? - Stack Overflow
procfs - /proc filesystem - provides a method of communication between kernel space and user space - systctl

Minix

What Is MINIX? Is The World's Most Popular OS A Threat?
www.cs.vu.nl/~ast/intel/

andrew tanenbaum youtube - Google Search
Operating Systems - UNIX-likes - YouTube - YouTube
andrew tanenbaum youtube - Google Search
The Design of a Reliable and Secure Operating System by Andrew Tanenbaum - YouTube
Andrew Tanenbaum - MINIX 3: A Reliable and Secure Operating System - Codemotion Rome 2015 - YouTube
Tanenbaum–Torvalds debate - Wikipedia
Linux Basics « Null Byte :: WonderHowTo

Windows

Why it matters that Microsoft released old versions of MS-DOS as open source | Opensource.com
First leaked benchmarks of Windows 10 on ARM alarming - MSPoweruser
Answer - Quora
Speed Up Internet Using CMD (Command Prompt)

Command_Line

Some Windows command line tricks you may not know - Coding Security
Top 200+ Best CMD Tricks,Tips And Hacks Of 2018 (CMD StarWars)
Powershell remoting for the masses made easy with parallelexecution module | Fernando Rubio Román | Pulse | LinkedIn
Environment Variables | Microsoft Docs
windows - List all environment variables from command line? - Stack Overflow
gci powershell at DuckDuckGo
Percent symbols - % - Windows CMD - SS64.com

How To Create Undeletable Folder In Windows

Windows_Kernel

Compiler bug? Linker bug? Windows Kernel bug. | Random ASCII
One Windows Kernel - Microsoft Tech Community - 267142

Maintainance-Troubleshooting

Fix Limited Access in Windows 7 (WiFi Unidentified Network)
Using Ping to Troubleshoot Network Problem
Windows Troubleshooting - Advanced DNS Query Debugging with NSLookup

windows management framework wikipdia at DuckDuckGo
PowerShell - Wikipedia
power shell vs linux terminal at DuckDuckGo
netsh - Wikipedia
Using the App File Explorer to see your app data - Windows Developer BlogWindows Developer Blog
How to Access the Application Data Folder | Techwalla.com

Registry

registry windows what is at DuckDuckGo
Windows Registry - Wikipedia

Mac_OS_X

Setting_up_Hackintosh

What Is A Hackintosh Computer? Is It Illegal To Hackintosh My Laptop?

Leveraging Emond on macOS For Persistence – Posts By SpecterOps Team Members

Mobile_OSes

Android

how does termux work at DuckDuckGo

Useful_Apps

10 best Android Apps which are not available on Google Play Store » TechWorm

How Facebook Is Ruining Your Android (and What You Can Do)
Google to help developers build automated driving modes by opening the API behind Pixel 2’s Do-Not-Disturb | VentureBeat
5 Android Hacks You Can Do Without Rooting Your Mobile
How to Find Your Android Device Info for Correct APK's Download
How To Speed Up Android Device After Rooting
Secret settings hidden in your Android phone will make it feel twice as fast – BGR

iOS

iPhone’s Apple Health data used as evidence in murder trial – Naked Security

Mobile operating system - Wikipedia

Building_Own_OSes_Projects

How do operating systems… run… without having an OS to run in? - Software Engineering Stack Exchange
When do you require an operating system for a given microcontroller? Is it required whenever I interface the controller with external hardware?
Is it always necessary to have an operating system? - Quora
GitHub - tuhdo/os01: Bootstrap yourself to write an OS from scratch. A book for self-learner.
GitHub - tuhdo/sample-os: A sample OS as demonstrated in the book Operating System: From 0 to 1
Writing an OS *from scratch*
Fuchsia OS : C++ est-il plus avantageux que C pour le développement d'un microkernel ? Le choix de Google divise
Operating Systems: Three Easy Pieces
GitHub - Cryptogenic/JinxOS: JinxOS is a minimalist operating system written in C and ARM. The focus is to quickly and easily interface with connected hardware for education and testing purposes.
Build simple Operating System for Raspberry Pi
Introduction - Operating System Development
How to write a simple operating system in assembly language
Operating System: Development Guide - definitive stet by step turorials series -- Boot Sector Structure - First Bootloader Code - Setting up a Toolchain and Using Bochs - File Allocation Table (FAT) and Reading from Disk - Using Makefiles and the Second stage Bootloader - Memory and How the CPU Accesses it - Protected Mode and the Global Descriptor Table (GDT) - Setting up the Interrupt Descriptor Table (IDT) - Enabling the A20 Line - Jumping to Protected Mode - First and Second Stage Bootloaders - Hercules CGA Emulators: How do they work? - In the Beginning was the Command Line

Platform-Agnostic_Concepts

File-Systems

File_Formats

What is the difference between an ISO and an SFS file? - Quora
IMG (file format) - refers to binary files with the .img filename extension that store raw disk images of floppy disks, hard drives, and optical discs or a vector image - vs ISO, ISO 9660 (for CDs) or UDF (for DVDs) - CUE/BIN and CCD/IMG formats, which usually contain raw disc images, can also store ISO images instead - BIN Format, .bin files
ISO image - Wikipedia
What is the difference between an .iso file and an .img file? - Quora
What Are the Differences Between ISO and IMG Files? | Techwalla.com
Cue sheet (computing) - metadata file - CUE/BIN binary format .bin files - CD ripping
Disk image - mounting/unmounting - FDE on-the-fly disk OTFE, FreeOTFE and TrueCrypt - Virtual machine image

INI file - Wikipedia
File system - Wikipedia

Archives_and_Compression

Tar Vs Ar vs Zip Vs Gz : Difference And Efficiency
An Introduction to File Compression Tools on Linux Servers - lossy/lossless compression basics - tar archives - gzip .gz VS bzip2 .bz2 VS LZMA2 .xz - | DigitalOcean
Which is more efficient - tar or zip compression? What is the difference between tar and zip? - Super User
Why are tar archive formats switching to xz compression to replace bzip2 and what about gzip? - Unix & Linux Stack Exchange
compression - How many times can a file be compressed? - Stack Overflow
Can compressed files be compressed further? - Quora
compression - Can Double Zipping Cause Problems? - Super User
compression - Pros and cons of bzip vs gzip? - Super User
How to open rar file in linux? - Unix & Linux Stack Exchange
linux archive difference directory - Google Search
Archive file - Wikipedia
List of archive formats - Wikipedia
Comparison of archive formats - Wikipedia
What is data archiving? - Definition from WhatIs.com
Use tar vs bzip2 for creating a .tar.bz2 archive? - Super User
DEFINITIVE - Compressing/Decompressing files under Linux or UNIX - list files without decompressing the archive - definitive cheat sheet - gzip, tar, zip, bzip formats

Volume = logical drive - a single accessible storage area with a single file system, typically (though not necessarily) resident on a single partition of a hard disk. Although a volume might be different from a physical disk drive, it can still be accessed with an operating system's logical interface - Differences with partition
Is a Container, Volume/Logical Volume, or Partition all the Same?
filesystems - Device vs Partition vs File System vs Volume: how do these concepts relate to each other, accurately - Definitive Data, storage device, filsystem definitions
The Difference Between a Drive, Disk, Volume, Partition, and Image - Make Tech Easier
DEFINITIVE - Differences between volume, partition and drive - LVMs - hard disk, SSD - SATA, PATA, SCSI, IDE - device nodes - MBR/GPT
server - What is LVM and what is it used for? - Ask Ubuntu
Logical Volume Manager (Linux) - device mapper target that provides logical volume management for the Linux kernel. Most modern Linux distributions are LVM-aware to the point of being able to have their root file systems on a logical volume - RAID - CLVM, HA-LVM, lvmlockd - Implementation details - Caveats
Logical Disk Manager LDM - an implementation of a logical volume manager LVM for Microsoft Windows NT
FAT filesystem and Linux compatibility - drivers - VFAT, msdos, umsdos
Design of the FAT file system - VFAT long file names
File Allocation Table FAT - file system architecure - 8-bit FAT, FAT12, Initial/Final FAT16, Logical Sectored FAT, FAT32 - 4 GiB file size limit - Extended Attributes, long file names - Turbo AT, FATX, exFAT, FAT+
filesystems - What is the difference between VFAT and FAT32 file systems? -
3 Ways to Remove Write Protection on an SD Card - Physical Lock Switch - read only file system problem
What is file system? - Definition from WhatIs.com
List of file systems - Wikipedia
FAT - File Allocation Table (FAT) is a computer file system architecture and a family of industry-standard file systems utilizing it. The FAT file system is a legacy file system which is simple and robust.
command line - Why the "v" in mkfs.vfat? FAT12, FAT16, vFAT, FAT32

Clipboard (computing) - Wikipedia
balena-io/etcher: Flash OS images to SD cards & USB drives, safely and easily - File Writing Tool

Drivers

Proprietary device driver = Binary Blob - Wikipedia
Device driver - Wikipedia
Character device drivers — The Linux Kernel documentation
Talking To Device Files - ioctl -

terminology - Is there any difference between the terms userland and userspace? - Computer Science Stack Exchange
User space/Userland - Kernel Space - debuggers - shared memory in IPC - system call interface SCI - Implementation through Protection Rings

Processes

Child process - subprocess, subtask - fork, spawn - init process

References

Expanded Main Page - OSDev Wiki

7 Risks of Dual Booting Windows and Linux Operating Systems
linux - What is difference between User space and Kernel space? - CPU ring

Networking

Protocol_Implementations

Ethernet

HTTP

The HTTP series (Part 1): Overview of the basic concepts - CodeProject
RFC 7231 - Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content
RFC 7540 - Hypertext Transfer Protocol Version 2 (HTTP/2)
What happens when you type an URL in the browser and press enter? HTTP, TCP IP Stack, DNS Query, Cache, ISP, Browser - Root/Top-Level/Second-Level/Third-Level Domains definitive visual explanation
What Happens When You Type a Url in Your Browser and Press Enter - definitive breakdown - tcp syn segments, dns cache, DNS request in UDP datagram - MAC Address, ARP table - NAT - internal-to-external translation/external-to-internal translation - Connection: Keep-Alive HTTP

ARP

What is Address Resolution Protocol (ARP) and How does it Work ?
3 Things You Wanted To Know But Never Asked About MAC Addresses

WebSockets

WebSockets versus REST?
what is a socket networking at DuckDuckGo
networking - What is the difference between a port and a socket? - Stack Overflow
About HTML5 WebSocket - Powered by Kaazing
HTML5 WebSocket - A Quantum Leap in Scalability for the Web
ajax - WebSockets protocol vs HTTP - Stack Overflow
ajax vs websocket at DuckDuckGo
WebSocket - The Wireshark Wiki
About HTML5 WebSocket - Powered by Kaazing
HTML5 WebSocket - A Quantum Leap in Scalability for the Web

Industrial_Networking_Protocols

tls over mqtt at DuckDuckGo
amqp vs mqtt - Google Search
RabbitMQ, AMQP, MQTT & Rest of the world – Sakib Sami – Medium
Tutorial: Secure TLS Communication with MQTT using mbedTLS on top of lwip | MCU on Eclipse
ethernet vs industrial ethernet at DuckDuckGo
usb vs ethernet at DuckDuckGo
differencebetween.net/technology/hardware-technology/difference-between-usb-and-ethernet/
What-is-the-difference-between-Ethernet-and-Industrial-Ethernet - Quora
opc ua in avionics at DuckDuckGo
OPC Unified Architecture - Wikipedia
opc ua over tsn - Google Search
io link vs opc ua at DuckDuckGo
OPC ua vs opc classic - Google Search
opc ua over mqtt at DuckDuckGo
Modbus - Wikipedia
What is CAN Bus?
CAN bus - Wikipedia
CAN Bus Explained - A Simple Intro (2018)
opc ua car industry at DuckDuckGo
OPC UA ANSIC! The official UA ANSI-C Stack and Sample Applications from the OPC Foundation
opc ua over mqtt at DuckDuckGo
communication - OPC UA protocol vs MQTT protocol - Stack Overflow
OPC UA: The Information Backbone of the Industrial Internet | GE Automation
profinet vs opc ua at DuckDuckGo
OPC and OPC UA explained
OPC UA Adoption by Honeywell Process Solutions | Automation.com
GitHub - OPCFoundation/UA-AnsiC: UA ANSI C Stack reference implementation for OPC UA
profinet vs ethernet at DuckDuckGo
profinet siemens at DuckDuckGo
Fieldbus - Wikipedia
io link - Google Search
amqp at DuckDuckGo
RabbitMQ, AMQP, MQTT & Rest of the world – Hacker Noon
Anybus X-gateway - Network to Network & IIOT Gateways

networkmanagementsoftware.com/introduction-network-protocols/
6 must-read internet standards | Opensource.com
Serial communication - Wikipedia
RS-232 - Wikipedia
data transmission - OSI Model - layer 1 physical, layer 2 data link, layer 6 presentation - cryptography
communication channel
long-haul communication
Computer network - Wikipedia
Network News Transfer Protocol - Wikipedia

Fundamentals

Duplex (telecommunications) - Wikipedia
What is the loopback device and how do I use it? - Ask Ubuntu
bootp vs dhcp at DuckDuckGo
tcp vs http at DuckDuckGo

Hardware

Why You Need to Reboot a Router - Consumer Reports
Why does restarting/resetting the router work? - Super User
why is it necessary to reboot router to connect to WiFi at DuckDuckGo
What Is a Network Switch, and Do You Need One?: Reviews by Wirecutter | A New York Times Company
Router vs Switch vs Hub: What's the Difference? Webopedia
network interface vs network card at DuckDuckGo
what is network interface at DuckDuckGo

VoIP

why do voip apps need phone number at DuckDuckGo

subnetting theory course pdf - Google Search
Networking - YouTube - YouTube
subnetting theory course pdf - Google Search
osi model pdf - Google Search
Networking Basics: TCP, UDP, TCP/IP and OSI Model | TCP vs UDP - MTU
TCP/IP and Networking Fundamentals for IT Pros | Pluralsight
Cisco CCNA Course: Introduction to Networking | Pluralsight
TCP/IP Networking for Developers | Pluralsight
The Complete Networking Fundamentals Course. Your CCNA start | Udemy
Cisco Networking Fundamentals & LABS! | Udemy
Video_Notes_On_Tanenbaum_Network_Book_5thEd
hub vs switch vs router at DuckDuckGo
Learn the Fundamentals of Networking | Udemy
best tutorial packet tracer cisco at DuckDuckGo
How to learn how to use Cisco Packet Tracer from beginning - Quora
Cisco Packet Tracer Tutorial - Resources to Download Cisco Packet Tracer
Tutorials | Welcome to DNS Made Easy Tutorials
Networking Basics « Null Byte :: WonderHowTo
Free Networking tutorials, System Administration Tutorials and Security Tutorials - omnisecu.com
How broadband Internet works - Explain that Stuff
A Hitchhiker's Guide to the Internet: Today and Now, How It All Connects « Null Byte :: WonderHowTo
A Hitchhiker's Guide to the Internet: A Brief History of How the Net Came to Be « Null Byte :: WonderHowTo
Hacker Fundamentals: A Tale of Two Standards « Null Byte :: WonderHowTo
Hacker Fundamentals: The Everyman's Guide to How Network Packets Are Routed Across the Web « Null Byte :: WonderHowTo
networking - Why do computers have 65,535 TCP ports? - Super User
Hack Like a Pro: Networking Basics for the Aspiring Hacker, Part 1 « Null Byte :: WonderHowTo
Hack Like a Pro: Networking Basics for the Aspiring Hacker, Part 2 (TCP/IP) « Null Byte :: WonderHowTo

Proxys

what is a gateway in networking at DuckDuckGo
How to setup a transparent proxy server for wifi with zero client configuration like in airports and coffee shops? : sysadmin
What is a transparent proxy? | ExpressVPN
API proxy or gateway? | API Management Blog - Akana
What is the difference between a proxy and a VPN? - Quora
What is the difference between a Gateway and a Firewall? - Information Security Stack Exchange
what's distinction of HTTP proxy, tunnel, gateway? - Stack Overflow
What are the differences among proxy, gateway and tunnel? - Quora
Difference Between a Proxy Server &amp; a Gateway | Techwalla.com
Difference Between Gateway & Router | Techwalla.com
Proxifier - The Most Advanced Proxy Client
tunneling - How to force ALL programs to use my Proxy? - Information Security Stack Exchange
Proxy server - Wikipedia
[HOW TO] Use PROXIFIER to run applications through proxies + Installation Tutorial | TBN

Understanding IP Addresses, Subnets, and CIDR Notation for Networking | DigitalOcean
Classless Inter-Domain Routing - cidr - Wikipedia
ipv4 - The slash after an IP Address - CIDR Notation - Network Engineering Stack Exchange
network interface - Show netmask using ip tool - Unix & Linux Stack Exchange
Telecommunication - Wikipedia
Network address - Wikipedia
networking - What is the difference between a port and a socket? - Stack Overflow
What is the difference between a packet and a frame with reference to the OSI model? - Quora
Difference Between Segments, Packets and Frames
networking - Difference between PACKETS and FRAMES - segments - datagrams - definitive comparison
networking - Frame-based and stream-based protocols - Stack Overflow
internet - What are the differences in the contents of datagrams, frames, segments and network packets? definitive visual explanation - Application data as FTP, HTTP
IPv6 Fragmentation - vs IPv4 vulnerabilities - RA-Guard antivirus evasion | NETSCOUT
IPv4 - Fragmentation_and_reassembly
IP fragmentation - Wikipedia
TCP connection status/state table and diagram - definitive breakdown
TCP half-open - embryonic connection - Wikipedia
Handshake - handshaking - telecommunications - TCP, TLS, SMTP, WPA2 wireless, Dial-up access modems - Wikipedia
State (computer science) - stateful program, staeless protocol - Wikipedia
Stateless/Stateful protocol - Wikipedia
Memcached - general-purpose distributed memory caching system. It is often used to speed up dynamic database-driven websites by caching data and objects in RAM to reduce the number of times an external data source (such as a database or API) must be read
What is TCP/IP | Cloudflare
What is UDP/IP - vs TCP - vulnerabilities
Network scheduler - aka packet scheduler, queueing discipline, qdisc or queueing algorithm, is an arbiter on a node in packet switching communication network. It manages the sequence of network packets in the transmit and receive queues of the network interface controller
python - What is "backlog" in TCP connections? three way handshake requests queue
Understanding socket and port in TCP - Backlog Queue – Fantageek – Medium
Understanding TCP/IP Network Stack &amp; Writing Network Apps - There is the TCP Control Block (TCB) structure connected to the socket. The TCB includes data required for processing the TCP connection. Data in the TCB are connection state (LISTEN, ESTABLISHED, TIME_WAIT), receive window, congestion window, sequence number, resending timer, etc.
Increasing the Size of the TCB Hash Table - TCP Transmission Control Block
RFC 791 - Internet Protocol IP Specifications - 1981
Transmission Control Block, TCB
Transmission Control Protocol TCP - Header - Segment structure - IPv4/IPv6 checksums - Three-way handshake - states - Vulnerabilities, DDOS SYN Flood/Cookies cryptographic puzzles, sockstress, PUSH/ACK Floods abuse of TCP Persist Timer, connection hijacking, TCP veto, TCP reset - Sequence/Acknowledgment number - Transmission Control Block TCB - datagram
SPECIFICATION OF INTERNET TRANSMISSION CONTROL PROGRAM - TCP (Version 2) - Vinton Cerf - March 1977
Internet protocol suite = TCP/IP - aka Department of Defense (DoD) model because the development of the networking method was funded by the United States Department of Defense through DARPA
Internet Protocol - IP
IP header - Wikipedia
Encapsulation (networking) - Wikipedia
What’s The Difference Between The OSI Seven-Layer Network Model And TCP/IP 4-Layers Model? TCP header vs IP header - IPv4 vs IPv6 headers
What is the difference between TCP and IP protocols ? TCP vs IP definitive breakdown - IP is a NETWORK Layer protocole, TCP is a TRANSMISSION Layer Protocol
RFC 1594 - FYI on FAQ Questions and Answers - Answers to Commonly asked "New Internet User" Questions - definitive answers to misc basic questions - Internet, TCP - IETF, IAB, IRTF, IANA, NIC, NOC, InterNIC, , DDN NIC, IR, Telnet
RFC 793 - Transmission Control Protocol TCP - DARPA INTERNET PROGRAM - PROTOCOL SPECIFICATION - September 1981
Flooding (computer networking) - Wikipedia
Reverse-path forwarding - RPF - Unicast RPF uRPF as mitigation against IP spoofing used in DDoS
Data link layer - Wikipedia
What is a TCP 3-way handshake? sequence number - full duplex
What is HTTP - method, verb - request headers - request body - HTTP response, status code, response headers, optional body - DDOS - stateless protocol definition - HTTP request use TCP connections, HTTP 1.1 use persistent TCP connections
What is The OSI Model | Cloudflare
Hypertext Transfer Protocol - HTTP - TRACE verb in cross-site tracing attack - security
POST - HTTP Verb
Header (computing) - Wikipedia
Network packet - vs frame - encapsulation
Network layer - OSI Model Layer 3 - packet forwarding

DNS

Pseudo-top-level domain - .bitnet, .csnet, .oz, and .uucp, .exit, .i2p, .onion
Alternative DNS root - Wikipedia
Domain Name System - DNS - hosts - NXDOMAIN in RCODE Flag - Security issues, Domain Name System Security Extensions (DNSSEC) , cryptographic authentication/signature - DNS primarily uses the User Datagram Protocol (UDP) on port number 53 to serve requests
.local - multicast domain name service (mDNS) or local Domain Name System servers
.arpa - top-level domain (TLD) in the Domain Name System
Top-level domain - Wikipedia
How To Easily Access Your Home Network From Anywhere With Dynamic DNS - DDNS - router port forwarding
Name server - authoritative name server
Root name server - Wikipedia
Google Public DNS - DNS Cache poisoning, security
networking - Why should I use DNS 8.8.8.8? - google public dns
networking - Google's DNS service: Google public DNS - privacy violation, subpoena, government surveillance
Domain Name System Explained - definitive article - security - jargon/terminology/technical terms - tools/commands - authoritative vs recursive server
What Is TLD Name Server? top-level domain
How DNS Works
What is DNS?
internet - How should I choose my DNS? - Super User
How a DNS Server (Domain Name System) works. - YouTube
What is Domain Name Resolution
The Domain Name System - DNS
browser - Difference between DNS and /etc/hosts in name resolving during an HTTPS request - Super User
Domain Name System Security Extensions - DNSSEC
Internationalized domain name - IDN
List of DNS record types - Wikipedia
WHOIS - RFC 3912 - WEIRDS RDAP - Wikipedia
Using dig +trace commands to Understand DNS Resolution from Start to Finish

Autonomous system (Internet) - ASN Autonomous Systsem Number - BGP Border gateway protocol - IANA Internet assigned numbers authority, RIR reigional internet registry
Point-to-point (telecommunications) - Wikipedia
List of IP protocol numbers - Wikipedia
RFC 2784 - Generic Routing Encapsulation (GRE)
RFC 2890 - Key and Sequence Number Extensions to GRE - Generic Routing Encapsulation
Overlay network - Wikipedia
protocol theory - What problem does GRE solve? MPLS, EBGP, Anti-DDoS services, over IPSEC
Multiprotocol Label Switching - MPLS
networking - Ethernet vs TCP vs IP? definitive answers with anologies
Generic Routing Encapsulation - GRE
What is Generic Routing Encapsulation (GRE)? - Definition from WhatIs.com
What is Generic Routing Encapsulation (GRE) and how does it differ from IP-in-IP? ip-to-ip, VPN, WAN
Generic Routing Encapsulation (GRE) - TechLibrary - Juniper Networks
GRE tunnel, why and what for ? - contiguous networks
Protocol stack - The protocol stack or network stack is an implementation of a computer networking protocol suite or protocol family. Some of these terms are used interchangeably but strictly speaking, the suite is the definition of the communication protocols, and the stack is the software implementation of them - definitive IP protocol implementation - OSI Layered Model, spanning layer
Point-to-Point Protocol - PPP - data link layer (layer 2) communications protocol used to establish a direct connection between two nodes. It connects two routers directly without any host or any other networking device in between. It can provide connection authentication, transmission encryption, and compression.
DECnet is a suite of network protocols created by Digital Equipment Corporation. Originally released in 1975 in order to connect two PDP-11 minicomputers, it evolved into one of the first peer-to-peer network architectures
Bridging (networking) - Transparent - Ethernet - wireless bride - OSI Layer 2 Data Link - vs Routing
Routing - Wikipedia
Border Gateway Protocol - BGP
Single point of failure - SPoF
OSI Model – definitive - packet travelling - MAC address = Burned In Address BIA
DEFINITIVE answers - ip - How do you calculate the netmask prefix length, network, subnet, and host numbers? subnetting -
Ethernet frame - Destination/Source MAC address - Ethernet packet on OSI Physical Layer 1 , Ethernet frame on OSI Data Link Layer 2 - Jumbo frames
How does a switch learn a MAC address not in its lookup table? - broadacast vs flood
MAC address - Media access control address
Network interface controller - NIC - network interface card, network adapter, LAN adapter or physical network interface
Jumbo frame - Wikipedia
IP address - Private addresses - classes A, B, C - Network Address Translation NAT - subnetting
Network address translation - NAT - IPv4 address exhaustion - TCP/UDP - Microsoft Secure NAT SNAT - NAPT, DNAT - port address translation (PAT), IP masquerading, NAT overload and many-to-one NAT
Subnetwork - subnetting
Subnetting Tutorials - subnetworks
Network Address Translation (NAT) - GeeksforGeeks
Network Devices (Active/Passive Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter) - GeeksforGeeks
Circuit Switching in Computer Network - GeeksforGeeks
Packet Switching and Delays in Computer Network - GeeksforGeeks
How DHCP server dynamically assigns IP address to a host? - GeeksforGeeks
networking - What makes a private IP address not routable? ISP LANs - ping - map ISP private network
What is NAT and how does it work tutorial - Network Address Translation within firewalls and routers - types of NAT, Static/Dynamic/PAT - IPv6
DEFINITIVE - What is the exact use of a MAC address? - vs IP - Ethernet - OSI Layers Model - ARP - How MAC addresses are generated, byte pattern meaning/significance
5 big misconceptions about virtual LANs | 802.1Q trunks, security
Virtual LAN - VLAN - scalability
Monitoring and Tuning the Linux Networking Stack: Receiving Data - definitive in depths technical epxlanation
User Datagram Protocol - UDP - Used as underlying protocol for DNS, SNMP, RIP, DHCP, OpenVPN - UDP vs TCP comparison
Routing table - Wikipedia
Routing protocol - gateways
RFC 1918 - Address Allocation for Private Internets
Private network - Wikipedia
List of TCP and UDP port numbers - definitive - well-known/system ports - privileges
networking - What do the different formats for network addresses indicate? - Super User
forwarding - How does Router know where to forward packet - NAT, PAT, NAPT
RFC 2663 - IP Network Address Translator (NAT) Terminology and Considerations
How incoming NAT traffic can be routed to an internal IP? - Quora
routing - Very simple NAT question. How does a packet get back out? DNAT
routing - How does NAT share one public IPv4 address across multiple private IPv4 addresses - Network Engineering Stack Exchange
UDP hole punching NAT port - Network Engineering Stack Exchange
Understanding Port Forwarding- Beginners Guide
How to Set Up a Home Network- Beginners Guide - LAN
How to Setup and Configure your Home Router - LAN
Internal and External IP Addresses - NAT router
Types of Network Address Translation (NAT) - PAT, Dynamic/Static NAT
Medium access control - MAC sublayer - In IEEE 802 LAN/MAN standards, the medium access control (MAC) sublayer is the layer that controls the hardware responsible for interaction with the wired, optical or wireless transmission medium. The MAC sublayer and the logical link control (LLC) sublayer together make up the data link layer.
Connectionless communication - Wikipedia
Connection-oriented communication - Wikipedia
RFC 826 - An Ethernet Address Resolution Protocol: Or Converting Network Protocol Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware - ARP - MAC address
What Is The Difference Between LAN, WAN, MAN, CAN, VPN, BAN, NAN, SAN?
What is the difference between a PAN and a LAN network? - Quora
Personal area network - PAN
Address plus Port - approach to the IPv4 address exhaustion/shortage - RFC 6346
IPv4 address exhaustion/shortage - Wikipedia
RFC 6346 - The Address plus Port (A+P) Approach to the IPv4 Address Shortage/Exhaustion
Mapping of Address and Port - MAP is an (almost) stateless alternative to Carrier Grade NAT and DS-Lite that pushes the IPv4 IP address/port translation function (and therefore the maintenance of NAT state) entirely into the existing customer premises equipment IPv4 NAT implementation, thus avoiding the NAT444 and statefulness problems of Carrier Grade NAT in operator network, and also provides a transition mechanism for the deployment of native IPv6 at the same time with very little added complexity

NTP

Network Time Protocol - NTP - Uses UDP on port 123
RFC 5905 - Network Time Protocol Version 4: Protocol and Algorithms Specification - NTP - Simple NTP SNTP - Crypto-NAK - kiss-of-death
Clock synchronization - clock drift
What is Network Time Protocol (NTP)? - atomic clocks, GPS clocks
time - NTP - How are NTP servers so accurate - Super User
Network Time Synchronization - Why You Need An NTP Server — Masterclock, Inc.
Circuit switching - virtual circuit switching - vs datagram packet switching
Trusted time - source - NTP
NTP Basics [Knowledge Base]
Home - Network Time Foundation
NTP Project - Network Time Foundation - Network Time Security
Precision Time Protocol - vs PTP, GPS
RFC 7822 - Network Time Protocol Version 4 (NTPv4) Extension Fields

Trailer (computing) - metadata - OSI model's layer 2 data link - ethernet frame
Frame (networking) - packet switching - interframe gap - ethernet frames, point-to-point protocol PPP frames
Protocol data unit - PDU - datagram vs segment vs packet - packet switching, service data unit SDU - MTU Maximum Transmission Unit, IP fragmentation - definitive breakdowns terms depending on OSI model layer
Service data unit - SDU - vs protocol data unit (PDU) - encapsulation - fragmentation, MTU
Sublayer - OSI Model
Symbol rate - aka baud rate / modulation rate - gross bitrate
Bit rate - Wikipedia
Bitstream - binary sequence, is a sequence of bits - byte stream - endianness/byte order
Payload (computing) - security, programming, networking - malware malicious payload
Interpacket gap - minimal pause may be required between network packets or network frames. This time between packets is known as the interpacket gap (IPG), interframe spacing, or interframe gap (IFG). Depending on the physical layer protocol or encoding used, the pause may be necessary to allow for receiver clock recovery, permitting the receiver to prepare for another packet (e.g. powering up from a low-power state) or another purpose.
Datagram - basic transfer unit associated with a packet-switched network. Datagrams are typically structured in header and payload sections. Datagrams provide a connectionless communication service across a packet-switched network.
Overhead bit - Wikipedia
Virtual circuit - VC - means of transporting data over a packet switched computer network in such a way that it appears as though there is a dedicated physical layer link between the source and destination end systems of this data. - OSI Layer 4 TCP, layer 2/3 data link / network - circuit switching
Reliability (computer networking) - reliable/unreliable networks - Reliable delivery in real-time systems - avionics
Lists of network protocols - Wikipedia
ntp server at DuckDuckGo

Network_Types

Mesh_Networking

bgr.com/2018/01/11/best-wifi-router-on-amazon-nighthawk/#ampshare=http://bgr.com/2018/01/11/best-wifi-router-on-amazon-nighthawk/
Qualcomm: Mesh networking is the future of smart homes | ZDNet
A mesh network spontaneously erupts in the US and helps connect Puerto Rico – TechCrunch

https://en.wikipedia.org/wiki/Decentralization
What is WAN (Wide Area Network)?

Wireless

RFID-NFC

rfid vs nfc at DuckDuckGo
What's the difference between RFID and NFC? | HowStuffWorks

What’s the Difference Between 2.4 and 5-Ghz Wi-Fi (and Which Should I Use)?

5G

[Update: Ajit Pai responds] White House security document proposes a nationalized 5G wireless network

Access Point Name - Wikipedia
How do 2G 3G 4G work? What role does frequency play here? What are bands?
How to turn your Android smartphone or an iPhone into a satellite phone » TechWorm
thehackernews.com/2018/01/wpa3-wifi-security.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+TheHackersNews+(The+Hackers+News+-+Security+Blog)&m=1
Difference between Tethering and Hotspot | Difference Between
how smartphone wifi tethering works at DuckDuckGo
electromagnetic radiation - How can wifi penetrate through walls when visible light can't? - Physics Stack Exchange

4G

4G is All-IP - How 4G Works | HowStuffWorks

Super high-speed internet delivered over the air isn't as crazy as it sounds - The Verge
cellular wireless vs wifi stack exchange - Google Search
What is the difference between Wi-Fi and WLAN? - Quora
Pocket WiFi vs SIM Card vs Data Roaming | Comparison
Wi-Fi vs. Ethernet: How Much Better Is a Wired Connection?
What is the difference between WiFi and a mobile hotspot? - Quora
What’s the difference between Wi‑Fi data and cellular data? | Verizon Wireless
What is the difference between WiFi and cellular connection? - Quora
wifi - Security of wireless connection vs. wired connection on wireless router - Information Security Stack Exchange
ieee 802.11 - Difference Between Wireless & Wi-Fi - Network Engineering Stack Exchange
low power - Comparison of wireless communication technologies: bluetooth vs wifi - Electrical Engineering Stack Exchange
wifi frequency vs bluetooth - Google Search
Here's What Wi-Fi Would Look Like If We Could See It - VICE
What is the difference between radio wave and WIFI? Why can’t we use traditional radio wave as our internet communication? - Quora
Is a WiFi the same as microwave and a Radio Frequency (RF) radiation? - DefenderShield
WiFi vs. Bluetooth: Wireless Electronics Basics | EAGLE | Blog
WiFi Networking: Radio Wave Basics
What is the difference between Wi-Fi, long-distance radio, and cell phone technology? | MacRumors Forums
Wi-Fi Router Dangers - Electromagnetic Field (EMF) Safety from Safe Space Protection

World_Wide_Web

Decentralized_Web_Architectures

Why Decentralization Matters – Chris Dixon – Medium
Projects - Protocol Labs
IPFS is the Distributed Web
IPLD - The data model of the content-addressable web
The Cyber Security Hub™ on LinkedIn: "via 101Blockchains"

Browsers

User agent - Wikipedia

Browsers_Brands

Mozilla's speedy new Firefox Quantum browser drops tomorrow
Firefox 57: Good news? It's nippy. Bad news? It'll also trash your add-ons • The Register
Firefox Quantum released
Introducing the New Firefox: Firefox Quantum - The Mozilla Blog
Why Firefox Had to Kill Your Favorite Extension
Firefox Private Browsing vs. Chrome Incognito: Which is Faster? - The Mozilla Blog
Firefox Quantum is a Really Great Browser - ExtremeTech
how to search bookmarks by contents in firefox at DuckDuckGo
Why I Switched From Chrome to Firefox Quantum
Firefox Quantum Isn’t Just “Copying” Chrome: It’s Much More Powerful
lifehacker.com/why-you-should-switch-from-google-chrome-to-firefox-1821879163#ampshare=https://lifehacker.com/why-you-should-switch-from-google-chrome-to-firefox-1821879163
Ciao, Chrome: Firefox Quantum Is The Browser Built for 2017 | WIRED
Bye, Chrome: Why I’m switching to Firefox and you should too
5 Alternative New Browsers to Replace Chrome

Google Wants to Kill the URL | WIRED
Will tech firms challenge China's 'open' internet? - BBC News
Save the Internet: FCC Unveils Plan to Rollback Net-Neutrality Rules
How a Web Browser Communicates With a Server
Un ingénieur de Google veut remplacer les cookies par des jetons HTTP générés et contrôlés par le navigateur, pour une meilleure sécurité en ligne
Web server - Wikipedia
World Wide Web - WWW
hosts (file) - security - spoofing, redirection to malicious sites
Hosts File and DNS - /etc/hosts - Virtual Hosts, apache, nginx - definitive
The Hosts File and what it can do for you - linux, windows, apple file locations
What Is the Windows Host File? And 6 Surprising Ways to Use It -
iis 7.5 - Is DNS server And Host file Are different? - Stack Overflow
Mapping URLs to Filesystem Locations - Apache HTTP Server Version 2.5
apache - What is Apache HTTPD exactly? tomcat, CGI
server - Is there any difference between apache2 and httpd? - Ask Ubuntu
httpd - apache
Apache HTTP Server - Wikipedia
Virtual hosting - Wikipedia
MX record - mail exchanger record
Message transfer agent - MTA - Internet email system, a message transfer agent, or mail relay

Connection_Speed

speed of light vs internet connections - Google Search
Negotiation speed/duplex between a Gigabit ethernet switch or hub and NIC - Network Engineering Stack Exchange
speed of wifi connection vs speed of light - Google Search
speed of wireless connection vs wired - Google Search
wireless connection vs wifi connection - Google Search
How to Make Your Internet Faster with Privacy-Focused 1.1.1.1 DNS Service
speed of light vs internet connections - Google Search
speed of wifi connection vs speed of light - Google Search
speed of wireless connection vs wired - Google Search
Fix Your Slow Internet With These Networking Options
squid : Optimising Web Delivery
Why Changing DNS Settings Increases Your Internet Speed
How To Hack DNS For Faster Internet Speed
Changing your router's DNS settings to increase speed and security
layer1 - Does bridging add delay? - Network Engineering Stack Exchange

file.allitebooks.com/20151012/Guide to TCPIP, 4th Edition.pdf
Port forwarding - Wikipedia
router - What is port forwarding and what is it used for? - Super User
Who provides the Internet service to Internet Service Providers (ISPs)? » TechWorm
What is “link aggregation” and how does it benefit your network? | PC Gamer
PRIVATRIX Monetizes Idle Bandwidth With New Peer-to-Peer Network – The Merkle
Performance benchmark: nuster vs nginx vs varnish · jiangwenyuan/nuster Wiki · GitHub
Everything You Need To Know About ARP: Address Resolution Protocol
How Level 3's Tiny Error Shut Off the Internet for Parts of the US | WIRED
Comcast Internet service crippled; affecting users across US
Testing IPv6 Networking in KVM: Part 1 | Linux.com | The source for Linux information
AT&T wants to bin 100,000 routers, replace them with white boxes • The Register
The Wireless Age Completely Passed Them By - Funny & True Stories - Not Always Right Funny & True Stories – Not Always Right
Cisco Training Courses: Prepare for CCNA, CCNP Networking Certifications
A Visual Representation of Capsule Network Computations
wireless connection vs wifi connection - Google Search
Prepare for a Lucrative Career in Network Administration with This 9-Part Training
Google Wants to Make the Internet Faster. Here’s How.
What is a DNS server and should I use a custom one? | PC Gamer
Create Multiple IP Addresses to One Single Network Interface
The Greatest Computer Network You’ve Never Heard Of - Motherboard
Prison Inmates Built PCs from e-Waste and Connected Online Using Prison Network
What Every Webmaster Should Know About DNS - DZone Web Dev
Telecommunications network - Wikipedia
Getting started with software-defined networking | Opensource.com
Basic Switch Configuration (2.1) > Cisco Networking Academy's Introduction to Basic Switching Concepts and Configuration
Cisco Networking: Switch Interface Configuration
List of router and firewall distributions - Operating systems - Wikipedia

Routers_firmware-Operating_Systems

dd wrt - Is DD-WRT totally open source or just partially open source? - Super User
DD-WRT vs. Tomato vs. OpenWrt: Which Router Firmware Is the Best? - Make Tech Easier
DD-WRT Forum :: View topic - DDWRT is not a real open source

Resources

Practical Networking .net – Networking presented simply, practically, and applicably

Network Driver Interface Specification - NDIS - application programming interface (API) for network interface cards (NICs)
Network socket - raw socket, nmap, ICMP ping

Troubleshooting

Network configuration and trouble shooting commands in Linux - GeeksforGeeks

Optical fiber - Wikipedia
Power-line communication - PLC - aka power-line carrier, power-line digital subscriber line (PDSL), mains communication, power-line telecommunications, or power-line networking (PLN)
networking - Is the MAC address needed outside of the LAN? LAN
Packet switching - VS circuit switching
Fast packet switching - Wikipedia

Embedded-Electronics-Internet_of_Things

Fundamentals

Electronics_Fundamentals

PyroEDU - Electronics Courses For Everyone
Learn About Electronics - Home Page

Embedded system - real time OS - microkernel, exokernel - Monolithic kernels
Top 7 Real Life Examples of Embedded Systems - TLists.com
What is an embedded system? Can Mobile be considered as an embedded product? - Stack Overflow
I’ve been looking around Google and want to know, technically speaking, what type of computer is a smart phone? Is it an embedded system? - Quora
Is a Smartphone an Embedded System? « Barr Code

Projects

Smart_Homes

How to build a smart home in an apartment | Android Central

SmartTv

Android_TV

Running Android on a Raspberry Pi 3 - The MagPi MagazineThe MagPi Magazine
Android Auto on Raspberry Pi: OpenAuto - The MagPi MagazineThe MagPi Magazine
Android Auto on Raspberry Pi 3 – AndroidPub
Android Pi Wiki | FANDOM powered by Wikia
How to Install Android TV in Raspberry Pi 3 - Make Tech Easier
android tv vs kodi on raspberry pi at DuckDuckGo
osmc vs android on raspberry pi at DuckDuckGo
How to Install Android on a Raspberry Pi
7 Amazing Android TV Tricks You Definitely Didn’t Know About
What's the Best Browser for Android TV? 5 Top Apps, Ranked
How to Make a Raspberry Pi Android TV Box
Android Pie on Raspberry Pi 3B(+) with hardware acceleration - Raspberry Pi Forums
Android on Raspberry Pi: How to run Google's popular OS - emteria.OS, Lineage OS, Android Things - Asus Tinker Board S

Introducing the Raspberry Pi TV HAT - Raspberry Pi

Kodi

References

Official Kodi Wiki
Kodi (software) - Wikipedia

Platforms

OSMC

Wiki - OSMC

Kodi_On_Raspbian

kodi on raspbian at DuckDuckGo
HOW-TO:Install Kodi on Raspberry Pi - Official Kodi Wiki
Raspberry Pi Media Center: How to Install Kodi on Raspbian
browser raspbian at DuckDuckGo
firefox on raspbian at DuckDuckGo
Raspbian vs. OSMC for Raspberry Pi - General Discussion - OSMC Forums

Raspbian vs. OSMC for Raspberry Pi - General Discussion - OSMC Forums
kodi raspbian vs osmc at DuckDuckGo
kodi on raspberry zero performance at DuckDuckGo

Configuration

Performance

real debrid at DuckDuckGo

Video_Formats_Codecs

performance - Why does the Raspberry Pi need a MPEG-2 licence? - Raspberry Pi Stack Exchange
codec - Why does a Raspberry Pi require a key to playback MPEG2 content? - Super User
Difference Between MPEG2 and MPEG4 | Difference Between

Buffering_Issues_Fixes

hd buffering kodi at DuckDuckGo
raspberry pi codec and iptv at DuckDuckGo
2 Best Ways to Stop Buffering in Kodi Now - Kodi Tips
How to stop Kodi buffering: The BEST fixes for a stable stream | Alphr

Why Your Kodi Box Isn’t Working, and What to Use Instead
kodi performance raspbian vs osmc at DuckDuckGo
The Raspberry Pi Zero makes a great, super cheap Kodi box - Performance Aspect of Kodi on RPi Zero | Android Central

LiveTV

Tvheadend - Official Kodi Wiki
capter la tnt avec kodi at DuckDuckGo
[Kodi/OpenELEC] Configuration des chaines IPTV avec Kodi | IT Tutorials
Tutoriel TV/RADIO - ADSL/TNT sur Kodi
pvr tv at DuckDuckGo
Live TV and PVR/DVR Setup Guide - Official Kodi Wiki
Free TV PVR (Personal Video Recorder) and TV Recording Software (thefreecountry.com)
Raspberry Pi iptv setup? : IPTV
iptv video format at DuckDuckGo
IPTV - A simple explanation of Web TV (Internet television)
How To Install Selfless IPTV Kodi Addon | WirelesSHack
Les meilleures extensions/addons IPTV pour Kodi - Classement des Meilleurs VPN

osmc azerty at DuckDuckGo
How To Fix Check The Log For More Information Kodi Error | Easy Method
How to Copy Kodi Profiles from one Device to Another?
Raspberry Pi 3 B Plus - problème de démarrage (mire arc-en-ciel + éclair) - MCHobby - Le Blog
Configuring Azerty Keyboard - lodkeys fr in /etc/local.rc
Keyboard layout corresponding to set Region - loadkey fr in local.rc

Kodi_Addons

COVENANT - No HD Sources or trouble streaming? FIX! - Kodi UK TV

vstream

Installation de Vstream sur Kodi - hitechland
VStream Kodi Installation

Addons_Development

How Do Kodi Addons Work? Beginner's Guide to Content on Kodi

13 Kodi Repos You Need to Uninstall and Why
Natively Watch Netflix on Raspberry Pi: the Detailed Guide
How To Install Smith and Wesson Kodi Addon | WirelesSHack
Mobdro for Kodi Download & Install Guide for XBMC - Mobdro Download App for PC, APK Android & iPhone Free
Install KODI in ARABIC and IPTV guide - Husham.com
ARABIC IPTV | Iptv2List.Com

Web_Browser

webbrowser for kodi at DuckDuckGo
Web browser released! - Raspberry Pi
How to Use Google Chrome in Kodi to Access Your Streaming Services - Make Tech Easier
Chrome Launcher Add-on: How to Browse The Web From Kodi

Raspberry Pi - Official Kodi Wiki
Using Kodi on the Raspberry Pi - Raspberry Pi Documentation
The Only Raspberry Pi 3 Kodi Tutorial You Will Ever Need
How to Customize Kodi with All the Bells and Whistles
[Official] Kodi on Raspberry PI 3- How to install- Quick Steps
Install Kodi to Turn Your Raspberry Pi Into a Home Media Center
Controlling Kodi on the Raspberry Pi - Kodipiguide
How Your Amazon Fire TV Stick and Kodi Could Cause Legal Issues
Kodi 18 will have Google Assistant integration - Android Authority
What Is Kodi? What Are Its Features? Is It Illegal? -- All Questions Answered
New Kodi warning and this one may stop you using it FOREVER | Tech | Life & Style | Express.co.uk
Best Kodi Forks For February 2018 - Top Kodi Alternatives
kodi on amazon fire stick at DuckDuckGo
How to Install Kodi on an Amazon Fire Stick - wikiHow
How To Watch All Your Favorite Netflix Shows For Free
20 Kodi Keyboard Shortcuts Every Kodi User Should Know
osmc vs kodi at DuckDuckGo
kodi on arduino rather than pi at DuckDuckGo
install osmc on arduino at DuckDuckGo
What is Kodi? (Are You At Risk Using Kodi?) - Android Authority
Accessing the command line - General - OSMC
Internet Browser - General Discussion - OSMC Forums
webbrowser osmc at DuckDuckGo
ocelot browser osmc at DuckDuckGo
Ocelot Browser for Online Video : OSMC
kodi source too slow for continuous playback at DuckDuckGo
subtitle autogeneration youtube kodi at DuckDuckGo
The Best Ways to Remote Control Kodi From Your Couch
How To Install Smith and Wesson Kodi Addon | WirelesSHack

Speech_To_Subtitle_Converter_Dispayer

how does youtube subtitles autogeneration work at DuckDuckGo
speech to subtitle converter arduino tv at DuckDuckGo
speech to subtitle converter raspberry pi tv at DuckDuckGo
speech to subtitle converter raspberry pi at DuckDuckGo
speech to subtitle converter raspberry pi at DuckDuckGo
speech to subtitle converter arduino at DuckDuckGo
speech to subtitle converter arduino at DuckDuckGo
Speech Recognition and Synthesis with Arduino - Arduino Project Hub
Speech Recognition With Arduino
An Arduino With Better Speech Recognition Than Siri | Hackaday
How to write a program to convert speech to text for my Arduino project - Quora
Voice to text translator raspberry pi - Stack Overflow
build subtitle generator for tv speech at DuckDuckGo
Can captions be generated automatically using speech recognition?
Google relaunches voice recognition kit for Raspberry Pi
build automatic subtitle displayer for tv at DuckDuckGo
sd card - Can I do speech to text converting with arduino? - Arduino Stack Exchange
Speech to Text - Build youtube-like automatic subtitle generator and displayer for tv - Raspberry Pi Stack Exchange

turn tv into smart tv at DuckDuckGo
How to transform any HDTV into a smart TV | PCWorld
How to Get a Smart TV for Cheap With an HDTV
Five of the best media-streaming boxes to turn your dumb TV into a smart one | Technology | The Guardian
Make Any Dumb TV a Smart TV: 10 Steps
The Raspberry Pi Home Theater: What You Can And Cannot Do
The Easiest Raspberry Pi Media Centre, With RasPlex
Mobdro — All the answers to your Mobdro questions
How to Choose and Optimise Your Raspberry Pi Browser
The 5 Best Raspberry Pi Smart TV Projects We've Seen

Building your own green, open source home | Opensource.com
6 open hardware home improvement projects | Opensource.com
Everything You Need To Set Up Raspberry Pi Home Automation
SmartHomeBeginner - Smart Home, Media, Server, and Technology
Steve's Home Networking and Home Automation Guide - resources

So you're doing an IoT project. Cute. Let's start with the basics: Security • The Register

Smart_Cities

Smart city implementation: Get it right the first time - IoT Agenda

Smart_Cars

Upgrade your car with these 5 Arduino projects | Opensource.com

Car_Tracking_System

RFID Tracking System | Hackaday
Where is my car? Realtime GPS+GPRS Tracking of Vehicles using Arduino
Use an Arduino to Build a Complete Multi-Station RFID Security Check System
1 - d77b9fde4d081e5b57273f8db77e478dfc2e.pdf
(PDF) Radio Frequency Identification (RFID) Based Car Parking System
Which RFID tags are best for vehicle tracking? - YouTube
How To: Track Vehicles with RFID - RFID Insider
How To: Track Vehicles with RFID
Long Range UHF RFID Item Tracking System - Hackster.io
RFID Vehicle Tracking System: Improve The Efficiancy - Corerfid
RFID Vehicle Tracking Systems, Devices And Technology, RFID Australia
Comparing Tracker Technologies (GPS, vs RFID vs Bluetooth vs Wi-Fi)

Fire alarm in JavaScript - CodeProject
Manage a Fleet of Drones - Hackster.io
How to build a raspberry pi cluster server - Coding Security
Make a DIY wall display with an old monitor and Raspberry Pi - CNET
How to Make Your Own Smart Speaker
How To Make A Pocket-sized DIY Linux Computer?
Autonomous Vehicle and Remote Surveillance with the Intel® Edison Platform - CodeProject
10 Raspberry Pi creations that show how amazing the tiny PC can be | Ars Technica
Top 10 Raspberry Pi Zero Projects That Make Use of Its Small Stature
Raspberry Pi and Arduino Laptop - Hackster.io
How to Make an Ultrasonic Range Finder Using an LCD and Arduino
Simple Arduino web server with ethernet shield - CodeProject
WebApp Controlled Gate Operator Add-on (IoT): 20 Steps (with Pictures)
GitHub - ThingEngineer/IoT-Gate-Operator-Addon: IoT Gate Operator Addon with web app based on the electric imp
Twenty IoT Builds That Just Won $1000 in the Hackaday Prize | Hackaday
IoT Water Alarm: 5 Steps (with Pictures)
750 Raspberry Pis Turned Into Supercomputer for Los Alamos National Laboratory - ExtremeTech
Learn how to make a Raspberry Pi alerting machine | Opensource.com
Zigbee-Based Wireless Arduinos, Demystified | Hackaday
Arduino Saves Gameboy Camera | Hackaday
How to create an Internet-in-a-Box on a Raspberry Pi | Opensource.com
Turn your old Raspberry Pi into an automatic backup server | Opensource.com
How you can build your own VR headset for $100 – freeCodeCamp
NO Fuss Micro:bit Temperature Monitor - Hackster.io
GitHub - mpentler/teletext-twitter: Reads your Twitter timeline and turns it into teletext pages for your Raspberry Pi
opensource.com/article/17/3/pi-display-dashboard?sc_cid=70160000001273HAAQ
https://opensource.com/article/18/2/block-ads-raspberry-pi?utm_campaign=intrel
IoT Doorman: Eye-Controlled Door for a Girl with Cerebral Palsy | Hackaday
Real-time Face Recognition: an End-to-end Project: 8 Steps (with Pictures)
This Motion-Detecting Wildlife Camera Was Made with Raspberry Pi
Turn a Raspberry Pi into a Personal VPN for Secure Browsing Anywhere You Go
Raspberry Pi VPN Access Point: Setup a Basic VPN Router - Pi My Life Up
Raspberry Pi Steam Box: Stream PC Games to the Pi - Pi My Life Up
10 Cool Raspberry Pi + Windows 10 IoT Core Projects
How to build a Raspberry Pi wireless access point | PC Gamer

Platforms

Platforms_comparison

intel nuc vs raspberry pi at DuckDuckGo
Watch out, Raspberry Pi: Intel unveils ultra-small Next Unit of Computing PC - ExtremeTech
What's in between a Raspberry Pi 2 and an Intel NUC? - htpc
TI LaunchPad or Arduino for first microcontroller? - arduino
Which is better for beginners, MSP 430 Launchpad or Arduino Uno? - Quora
Is TM4C123 similar to Arduino? - Arduino Stack Exchange
Arduino: Building LED and Espionage Projects - Google Search
Arduino Wearable Projects - Google Search
Arduino Android Blueprints - Google Search
Internet of Things with Arduino Blueprints - Google Search
mbed robotics - Google Search
mbed vs arduino - Google Search
arm sandboxing wiki - Google Search
Arduino: Building LED and Espionage Projects - Google Search
Arduino Wearable Projects - Google Search
Arduino Android Blueprints - Google Search
Internet of Things with Arduino Blueprints - Google Search
mbed robotics - Google Search
mbed vs arduino - Google Search
mbed os - Google Search
arm sandboxing wiki - Google Search
fpga vs arduino - Google Search
beaglebone black vs raspberry pi - Google Search
raspberry pi vs arduino - Google Search
beaglebone Black vs beagleboard - Google Search
Atmel AVR - Wikipedia
Raspberry Pi's latest competitor RockPro64 brings more power plus AI processor | ZDNet
Arduino VS Raspberry which is Best Computer?
The ASUS Tinker Board is a compelling upgrade from a Raspberry Pi 3 B+ | Jeff Geerling
stm vs arduino at DuckDuckGo
smartphone vs raspberry pi performance - Google Search
But aren't smart phones more powerful than a Raspberry Pi? : raspberry_pi
aaeon vs raspberry - Google Search
5 Raspberry Pi Alternatives You Need to Know About - Banana Pi
avr vs arm - Google Search

RaspberryPi

References

The Raspberry Pi Beginner's Guide is out now (and it's huge!) - Raspberry Pi
Raspberry Pi guide - The MagPi MagazineThe MagPi Magazine
Raspberry Pi - Teach, Learn, and Make with Raspberry Pi
Top 10 Raspberry Pi blogs to follow | Opensource.com
Raspberry Pi: The Unofficial Tutorial

RapsberryPi_Zero

Raspberry Pi Zero - Raspberry Pi
Zero WH: pre-soldered headers and what to do with them - Raspberry Pi

Models_comparison

tiva c launchpad vs arduino at DuckDuckGo
The Raspberry Pi 3 B+ is here with a Range of Awesome Improvements
Raspberry Pi 3 vs Pi 2: What's the difference? | Trusted Reviews
raspberry pi 3b+ vs zero at DuckDuckGo

Codecs_Licensing

How to Add MPEG-2 and VC-1 Video Codec Support to Your Raspberry Pi

Accessories

Raspberry Pi TV HAT - Raspberry Pi
shutdown switch raspberry pi at DuckDuckGo
Easily Add a Shutdown Switch to a Raspberry Pi
RaspberryPi SD cards compatibility - eLinux.org

A beginner’s guide to Raspberry Pi 3 | InfoWorld
Overclock your Raspberry Pi 3: The Utimate Guide
5 easy steps to getting started using Raspberry Pi | iMore
What is the Raspberry Pi 3? Everything you need to know about the tiny, low-cost computer | ZDNet
No coding required: Node-RED on a Raspberry Pi | Opensource.com
How to Boot Multiple Operating Systems on the Raspberry Pi with BerryBoot « Null Byte :: WonderHowTo
is raspberry pi an embedded system - Google Search
is raspberry pi an embedded system or a computer - Google Search
what is raspberry pi zero - Google Search
Google is making a computer vision kit for Raspberry Pi - The Verge
PiTunnel connects your Raspberry Pi to the world | TechCrunch
How to Use VNC to Remotely Access Your Raspberry Pi from Other Devices « Null Byte :: WonderHowTo
Kali Linux 2017.3 hands-on: The best alternative to Raspbian for your Raspberry Pi | ZDNet
techrepublic.com/article/want-to-set-up-a-network-of-raspberry-pi-computers-heres-how-to-do-it/
Easily Compiling OpenCV in Raspberry PI - Hackster.io
Roll Your Own Raspberry Pi OS | Hackaday
Firing up 750 Raspberry Pis | Hackaday
How to set up your Raspberry Pi without a keyboard, monitor, or mouse - howchoo
How to Setup a Raspberry Pi Without a Monitor or Keyboard
Use your desktop or laptop screen and keyboard with your Pi - Raspberry Pi
why raspberry pi need mpeg license at DuckDuckGo
Why do I have to buy the MPEG2 Codec License? : raspberry_pi
Does A Raspberry Pi Really Need Heat Sinks? : raspberry_pi
How to Overclock OpenELEC on the Raspberry Pi | Average Maker
Overclocking Raspberry Pi: How to Do It and What You Need to Know
Is a case with a fan necessary? : RetroPie
Is a fan needed for a Pi 3? : raspberry_pi
Best Raspberry Pi Heatsink - Keep Your Device Cool
What you need to know about overclocking Raspberry Pi
6 Lightweight Operating Systems for Your Raspberry Pi
Understanding RaspberryPi Boot Process - BeyondLogic
Chromium Embedded Framework CEF on the Raspberry Pi - Hardware Accelaration
pi 3 - what are the limitations of Google's official Android Thing port for Pi3? - Raspberry Pi Stack Exchange

Raspberri_Boot_Process

Raspberry Pi 4 boot EEPROM - start.elf, bootcode.bin, recovery.bin,
GitHub - raspberrypi/firmware: This repository contains pre-compiled binaries of the current Raspberry Pi kernel and modules, userspace libraries, and bootloader/GPU firmware.
Boot options in config.txt - Raspberry Pi Documentation
The boot folder - boot partition contents - definitive list - dtb Device Tree Blob files - bootcode.bin, start.elf - EEPROM
arm - How does Raspberry Pi's boot loader work? - boot process

Arduino

ISM Communications for Arduino | Hackaday
Spot Welder 1-2-3 Arduino Firmware
Hardware Abstraction Layer in Arduino

There's a mini-RTOS in my language - The AdaCore Blog
GitHub - travisgoodspeed/md380tools: Python tools and patched firmware for the TYT-MD380
Cypress PSoC et l'EDI PSoC Creator
NanoPi K1 Plus: A $35 Raspberry Pi clone with Gigabit Ethernet, 2x RAM, stronger GPU - TechRepublic
Single Board Computers, Embedded Board, Industrial PC, IPC - AAEON

Embedded_Systems

Embedded_code-Bare_metal_programming

Firmwares_Development

Das U-Boot - the Universal Boot Loader, often shortened to U-Boot - first and second stage bootloader - loaded by the system's ROM or BIOS from a supported boot device, such as an SD card, SATA drive, NOR flash (e.g. using SPI or I²C) - SPL (Secondary Program Loader) - device tree
WebHome < ELDK-5 < DENX
Firmcodes - firmware development, IoT embedded systems

Programmable_Logic_Controllers

Programmable logic controller - SCADA

VHDL - Wikipedia
ARM Programming with Bare C | Hackaday
Efficient C Tips #10 – Use unsigned integers « Stack Overflow
Using Modern C++ Techniques with Arduino | Hackaday
micropython - Google Search
Toolchain - OsmocomBB - Open Source Mobile Communications
Embedded C - Wikipedia
double buffer real time programming at DuckDuckGo
flip flop real time - Google Search
mutex performance real time - Google Search
mutexes in embedded system at DuckDuckGo
sequence diagram real time programming at DuckDuckGo
exception handling in realtime environment at DuckDuckGo
try catch performance c++ at DuckDuckGo
c - For embedded code, why should I use "uint_t" types instead of "unsigned int"? - Electrical Engineering Stack Exchange
A Hacker's Guide to Programming Microcontrollers - definitive intro « Null Byte :: WonderHowTo
Is it possible to run program without operating system (e.g boot the computer from a flash drive)? - Quora
kernel - How do operating systems… run… without having an OS to run in? BIOS code stored in CMOS setting - How does BIOS read boot sector
Motherboard Chipsets and the Memory Map | Many But Finite
operating systems - Would an executable need an OS kernel to run? - standalone program
operating system - Can I execute any c made prog without any os platform? - Stack Overflow
How do I write a simple bare-metal program? - CPU boot up
Embedded c - how to free allocated memory when a program crashes - Stack Overflow
Bare Metal Programming in C Part 1 - Cross-Compiling Raspberry Pi, Compiler/Linker - bOOT pROCESS
[C++Embedded] The biggest problem with using C++ in embedded systems: dynamic memory allocation in the STL
operating systems - Is memory allocation hardware handled or OS? - Software Engineering Stack Exchange
c - When does malloc return NULL in a bare-metal environment? - brk, sbrk - stack/heap collision - embedded systems
Introduction · Practical Guide to Bare Metal C++ - definitive ebook - Dynamic Memory Allocation - UART, Timer, GPIO, I2C, SPI - data serialization - device driver development - RTTI
Bare metal malloc - dynamic memory allocation - MMU dependance
GitHub - rsta2/circle: A C++ bare metal environment for Raspberry Pi with USB (32 and 64 bit) - malloc implementation embedded system
GitHub - embeddedartistry/libmemory: Embedded systems memory management library. Implementations for malloc(), free(), and other useful memory management functions
library - C standard libraries on bare metal - Electrical Engineering Stack Exchange
Implementing Malloc: First-fit Free List — Embedded Artistry
Why is malloc() harmful in embedded systems? memory fragmentation
programming - Is using malloc() and free() a really bad idea on Arduino? - embedded system/code - optimization - SRAM, EEPROM - Halting Problem
anti patterns - Embedded systems worst practices? - Stack Overflow
hardware - Is low-level / embedded systems programming hard for software developers? - Stack Overflow
Simply Embedded – Embedded systems from the board up

real time farlabs at DuckDuckGo
rtx operating system at DuckDuckGo
How to calibrate touch screens | Embedded
From zero to main(): Bare metal C - Definitive Introduction - Startup before main function - Interrupts, Reset_Handlers, SystemInit - OpenOCD Arduino fork - ARMv6-M - libc, __main
Standalone program - freestanding - bare metal - SoC microcontrollers, embedded systems, processors - security attack surface - vs Operating system complexity
Bare machine computing - Wikipedia
Bare machine - embedded systems, firmwares
definitive - How to run a program without an operating system? - bare metal - raspberry pi - boot sector, MBR - bootloader - GRUB multiboot - QEMU

Industrial_Internet_of_Things

iot vs iiot - Google Search
PLCnext Controller AXC F 2152
PLCnext Technology · GitHub
PLCnext Technology – the Platform for limitless automation - PHOENIX CONTACT

IoT_and_Cloud_relationship

Azure_Event

Azure Red Shirt Dev Tour NYC 2017 | Part 1 - YouTube
MXCHIP Microsoft Azure IoT Developer Kit - Google Search

The cloud and the Internet of things are inseparable | InfoWorld
The relationship between IoT and cloud computing - Quora
The Role of Cloud in the Internet of Things - IoT
The cloud and the Internet of things are inseparable | IoT

Recylcling_old_hardwares

what to do with an old laptop - Google Search
How to create a NAS from your old PC and Why you need one
Give old electronics new life with Linux and Raspberry Pi | Opensource.com

Refs

Embedded Gurus – Experts on Embedded Software
Dangerous Prototypes - Open Source Hardware Projects
Embedded Linux Wiki
iFixit: The Free Repair Manual - Hardware hacking - Repair - Fix
mbedded.ninja - embedded systems engineering
Proejct Introduction · Embedded Linux Wiki - firmware security resources, boot, real time - elinux.com
Embedded systems, IoT - i.MXDev Blog
Device Tree Tutorial (ARM) – dts, dtb - Flattened Device Tree - ATAGS - linux kernel

The Three Phases of the IoT Revolution and the Resources Developers Need to Get Started - CodeProject
Phone-Chip Designer Tackles 'Industrial' Internet of Things
Here's why IoT testing is really going to matter to QA pros
Arduino Blog » DIY vending machine with Arduino
Azure IoT Edge brings smarts to devices at the cloud’s edge
UK government issues advice on what makes 'Kodi boxes’ illegal
Massena Gets Super Fast Fiber Optic Network
Exclusive: Lockheed Skunk Works' X-44A Flying-Wing Drone Revealed - The Drive
Flash your Libre Firmware with a Libre Programmer | Hackaday
Security - overview

Artificial_Intelligence

AI_Dangers_Concerns

Human-level AI could be achieved "within five to ten years", say experts
UC Berkeley professor's eerie lethal drone video goes viral
The United Nations Met to Discuss a Possible Ban on "Killer Robots"
The 'creepy Facebook AI' story that captivated the media - BBC News
Kasparov: 'Embrace' the AI revolution - BBC News
IBM Is Clueless About AI Risks
This backflipping noodle has a lot to teach us about AI safety - The Verge
The Day Humans Taught Robots to Fight Back
A.I. will be 'billions of times' smarter than humans, man and machine need to merge
Watch a Human Try to Fight Off Boston Dynamics' Door-Opening Robot Dog | WIRED
Steve Wozniak doesn't agree with Elon Musk, Stephen Hawking on A.I.
Elon Musk responds to Harvard professor Steven Pinker’s A.I. comments

What Defines Artificial Intelligence? The Complete WIRED Guide

AI_Programming

AI_Programming_Projects

Buiding_AI_Engines

Test Driven Chess Artificial Intelligence - CodeProject
Number recognition with MLP Neural Network - CodeProject

How to Build DIY AI Projects Using Google TensorFlow and Raspberry Pi
State of Voice Coding — 2017 – bambuu – Medium
16 free E-books to kickstart your Artificial Intelligence programming - Coding Security

Robotics

Robot_Building_Projects

Top 10 Kickass Arduino Projects
Robotics simulator - Wikipedia
Actin (software) - Wikipedia
OpenNI - Wikipedia
Point Cloud Library - Wikipedia
Arduino Blog » ASPIR is a full-size, Arduino-powered humanoid robot
Getting started with open source robotics | Opensource.com
best arduino robot project at DuckDuckGo

Robot_Operating_System

gtest - ROS Wiki
Robot Operating System - Wikipedia

fffaraz/awesome-cpp: A curated list of awesome C/C++ frameworks, libraries, resources, and shiny things. Inspired by awesome-... stuff.
Robotics Programming Tutorial: How to Program a Simple Robot | Toptal
Killer robots: Experts warn of 'third revolution in warfare' - BBC News
US firm reveals gun-toting drone that can fire in mid-air - BBC News
RightHand robotics has automated a new type of warehouse work that could help Amazon (AMZN) — Quartz
Boston Dynamics' SpotMini robot dog looked right at us, and it was downright creepy
Modular Robotics Made Easier With ROS | Hackaday
How to train your robot: Research provides new approaches
Off-line programming (robotics) - Wikipedia
Outline of robotics - Wikipedia
Watch Boston Dynamics' Humanoid Robot Do Parkour

Machine_Learning

Data_Clustering

Beginning data clustering - CodeProject

The Unreasonable Ineffectiveness of Machine Learning in Computer Systems Research | SIGARCH
A bot lingua franca does not exist: Your machine-learning options for walking the talk • The Register
computer vision vs machine learning - Google Search
Google’s DeepMind achieves machine learning breakthroughs at a terrifying pace
Google's AI can create better machine-learning code than the researchers who made it
Introduction to Machine Learning - CodeProject
The best resumes will soon have “skilled in machine learning” instead of “proficient in Excel” — Quartz
Learning with light: New system allows optical 'deep learning'
How Retailers Use Latest Techniques from Machine Learning - CodeProject
BigDL – Scale-out Deep Learning on Apache Spark Cluster - CodeProject
Transfer Learning Using Neon - CodeProject
Distributed, Docker-ized Deep Learning with Intel® Nervana™ technology, neon, and Pachyderm - CodeProject
Intel® MKL-DNN: Part 1 – Library Overview and Installation - CodeProject
Intel® MKL-DNN: Part 2 – Sample Code Build and Walkthrough - CodeProject
The Limits of Artificial Intelligence and Deep Learning | WIRED

Speech_Recognition

Use google speech recognition in your app using python - Coding Security

Computer_Vision

[1803.05268] Transparency by Design: Closing the Gap Between Performance and Interpretability in Visual Reasoning
Artificial intelligence system uses transparent, human-like reasoning to solve problems | MIT News
A Year in Computer Vision
Can Technology Replace The Eye? - CodeProject
Beyond Machine Sight — Real Life
Barcode and QR code Scanner using ZBar and OpenCV | Learn OpenCV

Face_Recognition

Making your own Face Recognition System – freeCodeCamp

Open source image recognition with Luminoth | Opensource.com

Business-Wise

How NASA's A.I. moonshots idea could help your enterprise | Computerworld

Resources

Finnish university's online AI course is open to everyone

artificial intelligence gmail - Google Search
Google’s latest AI experiment lets software autocomplete your doodles - The Verge
OpenAI’s new system lets you train robots entirely in VR
Google’s Artificial-Intelligence Wizard Unveils a New Twist on Neural Networks | WIRED
10 Top Open Source Artificial Intelligence Tools for Linux
Microsoft Wants to Use AI and Machine Learning to Discover a Cure for Cancer
Meet the tech company that wants to make you even more addicted to your phone | TechCrunch
artificial intelligence gmail - Google Search
Gmail can use Google's AI to write replies for you
The Dark Secret at the Heart of AI - MIT Technology Review
How to Get Started as a Developer in AI - CodeProject
How to get started with AI(Artificial Intelligence) - Coding Security
World's Leading Physicist Says Quantum Computers Are "Tools of Destruction, Not Creation"
Google's Artificial Intelligence Builds Its Own AI 'Child'
AI's brightest minds are still figuring out how to understand their creations — Quartz
AI is the next phase of human evolution
Counterfeiters are using AI and machine learning to make better fakes
World power 'threatened' by Chinese AI - BBC News
Facebook's AI wipes terrorism-related posts - BBC News
How a Neural Network Learns to Talk in 14 Minutes [Video] - TechAcute
Artificial Intelligence Will Make Forging Anything Entirely Too Easy | WIRED
Scaling to Meet the Growing Needs of AI - CodeProject
Microsoft makes three more cognitive services generally available | ZDNet
What do made-for-AI processors really do?
This 'Mind-Reading AI' Can Draw Images Of What You're Thinking
hackread.com/ai-powered-search-engine-ella-security-footage/
Mysterious 15th century manuscript decoded by computer scientists using artificial intelligence | The Independent
Artificial Intelligence: The Complete Guide | WIRED
Google will teach you about AI and machine learning for free
ai-machine-learning-cybersecurity

Quantum_Computing

Computing_Models_Comparison

Researchers Finally Proved Quantum Computers are More Powerful Than Classical Computers - Motherboard
IBM finally proves that quantum systems are faster than classicals
The Ongoing Battle Between Quantum and Classical Computers
Simple Math Problem Shows Quantum Computing Is Better Than Your PC | Digital Trends
Teenager Finds Classical Alternative to Quantum Recommendation Algorithm | Quanta Magazine

Basics

Top 3 Quantum Myths and Misconceptions – Quantum Bits – Medium
Quantum logic gate - Wikipedia
Quantum computing - Wikipedia
Quantum Computing | Centre for Quantum Computation and Communication Technology
Quantum Mechanics for Scientists and Engineers | Stanford Lagunita
What Exactly Is Quantum Computing?
Here's what quantum computing is and why it matters
Is quantum computing just pie in the sky? - Quantum Computing Stack Exchange
Five ways quantum computing will change the way we think about computing
Quantum Computing Is Coming for Your Data | WIRED
The Era of Quantum Computing Is Here. Outlook: Cloudy | Quanta Magazine
Check out these 5 wild and wacky quantum computer facts for cool people
science Finally, a Problem Only Quantum Computers Will Ever Be Able to Solve Author: Kevin HartnettKevin Hartnett
What are quantum computers and how do they work? WIRED explains | WIRED UK
What Is Quantum Computing? The Complete WIRED Guide
Timeline of quantum computing - Wikipedia
Qubit - vs bit

Quantum_Algorithmics

Developing quantum algorithms for optimization problems
Quantum Algorithm Zoo
Quantum Computers Struggle Against Classical Algorithms | Quanta Magazine
[1807.04271] A quantum-inspired classical algorithm for recommendation systems

Quantum_Programming

How to program a quantum computer – Dr James Wootton – Medium
Microsoft’s new coding language is made for quantum computers
How Do You Code for a Quantum Computer? | Inverse
Microsoft Provides Free Lessons for Quantum Computing Programming | Digital Trends
Microsoft’s Quantum Programming Language, Q#, Could Help You Learn Quantum Physics | Digital Trends
How to write a quantum program in 10 lines of code (for beginners)

Microsoft_QSharp-Quantum_Development_Kit

Quantum computing | Microsoft
Quantum Development Kit | Microsoft
Setting up the Q# development environment | Microsoft Docs

How to program a quantum computer – Qiskit – Medium

Resources

Quantum information references | Microsoft Docs
resource request - Is my background sufficient to start Quantum Computing - Q#
Home Page For Umesh Vazirani - quantum academic resources and papers
Quantiki | Quantum Information Portal and Wiki - Quantum Computing Resources
Are there emulators for quantum computers? definitive list of quantum processor emulator - resources
GitHub - rigetti/pyquil: A Python library for quantum programming using Quil. open source quantum programming library in Python. The documentation includes a hands on introduction to quantum computing where you learn by programming - Q# alternative - resource - tool
GitHub - ebraminio/awesome-qsharp: A curated list of Q# code and resources - quantum computing
Programming quantum computers for non-physics majors - PyQuil - resources
What programming languages are available for quantum computers? Q# - PyQuil

There's a Massive Issue in Quantum Computing That No One Talks About, And We Just Got Closer to Overcoming It
Deterministic teleportation of a quantum gate between two logical qubits | Nature
Running quantum algorithms in the cloud just got a lot faster - MIT Technology Review
The World’s First Practical Quantum Computer May Be Just Five Years Away
Researchers 'teleport' a quantum gate
So, when can I play video games on my quantum computer?
How Fast Can Quantum Computers Get?
Two-qubit chip draws quantum computing closer | Cosmos
Quantum annealing - Wikipedia
D-Wave Systems - Wikipedia
quantum annealing at DuckDuckGo
What’s the difference between quantum annealing and universal gate quantum computers?
does Intel invest in Quantum processing - Google Search
Google’s Quantum Computing Push Opens New Front in Cloud Battle - Bloomberg
BREAKING: Engineers just unveiled the first-ever design of a complete quantum computer chip
Is Quantum Computing an Existential Threat to Blockchain Technology?
does Intel invest in Quantum processing - Google Search
Scientists pinpoint the singularity for quantum computers
Blind quantum computing for everyone
Corkscrew light beams could lead to practical quantum computers
A new kind of quantum computer
Quantum Supremacy Is Only Months Away, Says Google Team
Physicists Want to Rebuild Quantum Theory From Scratch | WIRED
Researchers Just Achieved One of the Major Requirements for Quantum Computing
Scientists Build a 51-Qubit Quantum Simulator and It's the Largest One Yet
A New Breakthrough in Quantum Computing is Set to Transform Our World
MIT Researchers Just Got One Huge Step Closer to a Quantum Computer | Inverse
When Will Quantum Computers Be Consumer Products?
New Quantum Technology Lets You Use Your Phone to Identify Counterfeit Goods
Record-breaking 45-qubit quantum computing simulation run at NERSC
IBM makes 20 qubit quantum computing machine available as a cloud service | TechCrunch
Microsoft's cool quantum computing plan embraces cryogenic memory | PCWorld
IBM Just Made a 17 Qubit Quantum Processor, Its Most Powerful One Yet - Motherboard
engadget.com/2018/01/09/this-is-what-a-50-qubit-quantum-computer-looks-like/#ampshare=https://www.engadget.com/2018/01/09/this-is-what-a-50-qubit-quantum-computer-looks-like/
Quantum Weirdness in Your Browser | Hackaday
New form of qubit control may yield longer computation times | Ars Technica
Why Quantum Computers Will Be an Amazing Tool for Social Innovators
Why JP Morgan, Daimler Are Testing Quantum Computers That Aren't Useful Yet | WIRED
How One Quantum Particle Can Send Messages to Itself
Quantum Communications in Your Browser | Hackaday
Here's why 100 qubit quantum computers could change everything
Gil Kalai’s Argument Against Quantum Computers | Quanta Magazine
Job One for Quantum Computers: Boost Artificial Intelligence | Quanta Magazine
Google thinks it’s close to “quantum supremacy.” Here’s what that really means. - MIT Technology Review
Une puce quantique photonique de 49 qubits et une nouvelle solution pour booster la puissance des systèmes de calcul quantique analogiques
Quantum Computing For Computer Scientists | Hackaday
Tuning into quantum: Scientists unlock signal frequency control of precision atom qubits
Pentagon sees quantum computing as key weapon for war in space - SpaceNews.com
Researchers prove the arrow of time is irrelevant to quantum computers
Wandering Bose-Einstein condensate may lead to scalable quantum computer – Ars Technica
Why we should be afraid of quantum computing | VentureBeat

Ressources_Administration

10 Essential Spark Interview Questions and Answers
3 open source log aggregation tools | Opensource.com

Virtualization

how does rfb protocol work at DuckDuckGo
how does rdp work at DuckDuckGo
kvm vs vmware at DuckDuckGo
Difference between KVM and QEMU - Server Fault
Automated provisioning in Kubernetes | Opensource.com
Learning Docker Networking — Part 1 – Hacker Noon
Funtainers: The Beauty of Running Containers as Functions - The New Stack
How to Extract Content from VMDK Files
How does a Hypervisor work? - Quora
Getting started with Vagrant | Opensource.com
Managing virtual environments with Vagrant | Opensource.com
vagrant vs chef at DuckDuckGo
The Top 5 Enterprise Type 1 Hypervisors You Must Know
ESXi Free vs Paid - What are the differences? | ESX Virtualization
kvm vs esxi - homelab
Which is better for virtualization - VMware or VirtualBox? - Quora
OSBoxes - Virtual Machines for VirtualBox & VMware
VirtualBox - Debian Wiki - linux config
VirtualBox networking explained - Networking modes - internal vs bridged vs Nat vs host only - security considerations
Chapter 6. Virtual Networking - NAT service, port forwarding - Bridged mode, ARP, MAC - promiscuous mode - wireless adapters
Virtualbox Bridged Networking Mode Allows VM to Connect to Your Router - LinuxBabe
The Catling Mindswipe: How-to: VirtualBox Networking Part Two - NAT and Bridged
virtualbox - How to allow other computers on the network to access my virtual web server? LAN to VM - bridged networking, NAT Service/Network port forwarding
Oracle VM VirtualBox: Networking options and how-to manage them | definitive breakdow NAT vs Bridged vs Internal vs Host-only vs NAT - Port forwarding configuration
Oracle VM VirtualBox Network Configuration Options - definitive comparison NAT vs Bridged vs Internal vs Host-only vs Generic - Port Forwarding
DEFINITIVE - VirtualBox Network Settings: All You Need to Know - NAT vs NAT network vs Bridged adapter vs Internal vs Host-only vs Generic driver - Port forwarding examples and configuration - Promiscuous mode - Bridging for wireless adapters
virtualbox.org • View topic - What does "Cable connected" checkbox change?
DEFINITIVE - How to Install Ubuntu on VirtualBox as a VM: Complete Walkthrough - VBoxLinuxAdditions.run - guest additions
How does bridged networking work in Virtualbox? - MAC Address, Sniffing, IP Address Spoofing - vs Multihoming -definitive breakdown
Chapter 4. Guest Additions

Cloud

Certifications

Amazon, Google, and Microsoft Aren't the Only Cloud Innovators Around
do vs aws - Google Search
Cloud_issues-Centralized_network_bottlenecks-P2P_and_decentralized_networks_advantages
The Role of Cloud Tech in AI and IoTWeb Hosting Blog by bodHOST
'Lambda and serverless is one of the worst forms of proprietary lock-in we've ever seen in the history of humanity' • The Register
Microsoft Runs a Simulation of the Entire Azure Network to Prevent Out
Pluralsight | Microsoft Azure
ovh vs aws - Google Search
Make your Cloud with Subutai - Hakin9 - IT Security Magazine
Amazon launches AWS Secret Region
Brief Introduction of Data Center Technologies - CodeProject
Creating Serverless Functions with Python and AWS Lambda
Serverless but not stress-free: enterprise computing moves outside the enterprise | ZDNet
What is the difference between SaaS, PaaS and IaaS with real life examples? - Quora

Storage_Strategies

Getting started with openmediavault: A home NAS solution | Opensource.com
Complete Guide to Setup a Network Attached Storage
Host your own cloud with Raspberry Pi NAS | Opensource.com
Network-attached storage - Wikipedia
Storage area network - Wikipedia
nas vs san at DuckDuckGo
How to build a Raspberry Pi-powered NAS | Windows Central

Annuary_Services-LDAP

Active_Directory

Introducing: Detection Lab – Chris Long – Medium

10 open source tools for your sysadmin toolbox | Opensource.com
Revisiting wallabag, an open source alternative to Instapaper | Opensource.com

Data_Sciences-Big_Data

Knowledge_Management_Systems-Local_Search_Engines

Is there a file local search engine like "Everything" in Linux? rlocate- Unix & Linux Stack Exchange
Prograstinator: Nutch + Solr for a local filesystem search engine - local search engine, knowledge management system
Apache Nutch - open source web crawler - Wikipedia
Full-text search - text retrieval - Wikipedia
Elasticsearch - distributed, multitenant-capable full-text search engine with an HTTP web interface and schema-free JSON documents - powered by Lucene - Wikipedia
List of information retrieval libraries - Lemur - Lucene - Solr - Elasticsearch - Manatee - Sonic - Sphinx - Tantivy - Toshi - Terrier Search Engine - Xapian - Wikipedia
Elasticsearch vs. Solr - Choosing Your Open Source Search Engine
Apache Solr vs Elasticsearch - the Feature Smackdown!
Elasticsearch Reference - Elastic
Solr vs. Elasticsearch: Who’s The Leading Open Source Search Engine? | Logz.io
How to develop a simple local search engine for full text search in local files - Stack Overflow
Web scraping -web harvesting, or web data extraction is data scraping used for extracting data from websites - Wikipedia
Search engine indexing - Indexer - Wikipedia
IntranetDocumentSearch - Nutch / Solr - local search engine - Nutch Wiki

Data Mining - Course - Autumn 2005
Four Sentiment Analysis Accuracy Challenges in NLP | Toptal
InUse - What if machines could talk ? - SaaS application by OptimData
How to set up a database if you’re a front-end developer
Enhancing Outlier Detection with Intel® Data Analytics Acceleration Library - CodeProject
30-minute Python Web Scraper – Hacker Noon
hadoop at DuckDuckGo

Cryptocurrency-Blockchains

Crypto Industry on ‘Brink of an Implosion,’ Researcher Says - Bloomberg
Bitcoin : l'industrie de la cryptomonnaie est au bord de l'implosion en raison d'un déclin graduel du volume de transaction, selon une étude

Resources

Blockchain community - Blockgeeks
Bitcoin Wiki - reference documentation

Technical_Foundations

Blockchains

Why does the blockchain need blocks? - Bitcoin Stack Exchange
Why do we need blockchains? - Bitcoin Stack Exchange
Home | Bitcoin Block Explorer
Difference between transaction chain vs blockchain - Bitcoin Stack Exchange
The Big Legal Issue Blockchain Developers Rarely Discuss - CoinDesk
(W39M00) Blockchain - Introduction - Hakin9 - IT Security Magazine
How blockchain can complement open source | Opensource.com
How to Build Your Own Blockchain Part 1 — Creating, Storing, Syncing, Displaying, Mining, and Proving Work - PoW Proof Of Work, PoS Proof Of Stake
How blockchain will influence open source | Opensource.com
How blockchain will reduce the cost of running an open organization | Opensource.com
Don't Use a Blockchain Unless You Really Need One - CoinDesk
What Does Cryptocurrency Have to Do With Blockchain Anyway?
TR_EB_blockchain_final2.pdf
Decentralization is blockchain's USP | Naveen Joshi | Pulse | LinkedIn
Blockchain evolution: A quick guide and why open source is at the heart of it | Opensource.com
What is Blockchain Technology? A Step-by-Step Guide For Beginners
Server Not Found
https://en.wikipedia.org/wiki/Distributed_ledger
https://duckduckgo.com/?q=blockchain+vs+database&t=ffab&ia=web
https://duckduckgo.com/?q=ledger+vs+blockchain&t=ffab&ia=web
security - What is the origin of insecure 64-bit nonces in signatures in the Bitcoin chain? - Bitcoin Stack Exchange
Proving Digital Events (Without Blockchain) - Bozho's tech blog
Blockchain For Students 101 -The Basics (Part 1) – Hacker Noon
Blockchain - Wikipedia
Proof of work - PoW - Challene-Response/Solution-verification - TPM - Bitcoin, Hashcash - mitigation against Denial of Service DoS attacks

White Paper · ethereum/wiki Wiki · GitHub
How the Bitcoin protocol actually works - definitive breakdown | DDI
Blockchain Demo
What is the difference between a cryptocurrency, a digital currency, and a virtual currency? - Quora
Cryptocurrency - Wikipedia
Digital currency - Wikipedia
https://en.wikipedia.org/wiki/Satoshi_Nakamoto
Bitcoin network - Wikipedia
mining theory - How many hashes create one Bitcoin? - Bitcoin Stack Exchange
ImponderableThings (Scott Driscoll's Blog): How Bitcoin Works Under the Hood - anonymity, TOR - double spending
https://www.youtube.com/playlist?list=PLXKn7LtkQIZVeXF-KzcCPo_2pyvCMza6p
http://www.imponderablethings.com/2014/09/the-essence-of-how-bitcoin-works-non.html
Bitcoin and cryptocurrency algorithms and implementation tutorial, blockchain - definitive basic explanation - decentralized peer-to-peer P2P networks - cryptographic hashing, infinite monkey theorem | Toptal

Nakamoto_Paper_Explanations

Satoshi Nakamoto’s Bitcoin Whitepaper: A thorough and straightforward walk-through
The Bitcoin White Paper Explained
Bitcoin white paper explained (PART 1/3) - Coinmonks - Medium
Bitcoin White Paper for normal people! - Wan Raitelli - Medium
Bitcoin Whitepaper Explained so Anyone Can Understand - Crypto Disrupt
The Bitcoin White Paper Explained, What you NEED to Know!

ep 13: How is bitcoin "locked" to an address - OP_CHECKSIG, locking scripts, signatures, UTXO chain - YouTube

Usage_Basics

Bitcoin: Seven questions you were too embarrassed to ask | Ars Technica
Living On Bitcoin For A Week: The Journey Begins
https://blockonomi.com/cash-out-cryptocurrencies/
https://duckduckgo.com/?q=cryptocurrency+vs+digitial+currency+vs+virtual+currency&t=ffab&ia=web
https://arstechnica.com/tech-policy/2017/12/bitcoin-a-beginners-guide/3/
What is Cryptocurrency? examples

Exchanges

Cryptocurrency exchange -
Ethereum - Wikipedia
Ripple (payment protocol) - Wikipedia
Bitcoin Cash - Wikipedia
EOS.IO - Wikipedia
What is EOS cryptocurrency? - Quora
ZB currency wikipedia at DuckDuckGo
OKEx - Wikipedia
Huobi - Wikipedia
https://duckduckgo.com/?q=bitcoin+vs+ethereum&ia=cryptocurrency
https://www.inverse.com/article/39360-bitcoin-vs-litecoin-vs-ethereum-the-difference-in-the-cryptocurrencies
https://99bitcoins.com/bitcoin-vs-ethereum-cryptocurrency-comparison/
List of cryptocurrencies
bitcoind - How do exchanges decide on cryptocurrency trading pairs? - Bitcoin Stack Exchange
Why Are Trading Pairs Important In Cryptocurrency? - The CryptoStache
Cryptocurrency Trading: Understanding Cryptocurrency Trading Pairs & How it Works - Master The Crypto

Wallets

Official TREZOR Shop
WALLETH - Android Ethereum wallet
Top 4 Cryptocurrency Wallets - Bitcoinist.com
How are public and private keys related to the wallet? - Bitcoin Stack Exchange
I have Bitcoins in a local wallet, how do I get my Bitcoin Cash without using an exchange? - Bitcoin Stack Exchange

Dangers_And_Concerns

The Hard Math Behind Bitcoin's Global Warming Problem | WIRED
Carney calls for crackdown on crypto-currency 'mania' - BBC News
Please don’t buy bitcoin with your credit card – BGR

Crypto Correction: Bitcoin and Ether Dive as Market Sheds $13 Billion - CoinDesk
Oh, Crap! Someone Accidentally Triggered A Flaw That Locked Up $280 Million In Ethereum
Ethereum Continues Improvements Amid Bitcoin Bickering
100 cryptocurrencies described in four words or less | TechCrunch
Bitcoin’s insane energy consumption, explained | Ars Technica
Understanding Ethereum Smart Contracts - Gjermund Bjaanes
BitTorrent inventor announces eco-friendly bitcoin competitor Chia | TechCrunch
Unforeseen Consequences and that 1929 vibe - Charlie's Diary
Microsoft and IOTA launch first cryptocurrency market for the Internet of Things
30 People Who Were Really Wrong About Bitcoin - Bitcoin News
Zcoin, une extension du Bitcoin au centre d'une énorme fuite estimée à 400 000 $, les failles d'un projet open source
MobileCoin: A New Cryptocurrency From Signal Creator Moxie Marlinspike | WIRED
Bitcoin Reaches End of An Era: Expert Blog
Bitcoin Crash: Here's What We Know About Big Cryptocurrency Price Drop | Inverse
Dai | Dashboard
A Long-Secret Bitcoin Key Is About to Be Revealed - CoinDesk
Living On Bitcoin For A Week: The Journey Begins
filecoin.io/

Bio-Informatics

[1809.08632] BrainNet: A Multi-Person Brain-to-Brain Interface for Direct Collaboration Between Brains
Bioinformatics - Wikipedia
Researchers Convert Human Bacteria into World’s Tiniest Tape Recorder
Bio-programming toolkit maker Asimov launches with $4.7M from Andreessen Horowitz | TechCrunch

Miscellaneous

Office

Graphics

Blender

how to export animation in blender to collada - Google Search
how to export animation in blender to collada - Google Search
color animation blender - Google Search
color change animation tutorial-blender - YouTube
Blender Help 11: Animate Color Change Transitions in Blender Beginner Tutorial - YouTube
how to export animation in blender to collada - Google Search
unjoin objects in blender - Google Search
how to join and unjoin in blender 3d v2.76 :spoken tutorial (easy, beginner) - YouTube
Blender Basics 07 - Separate and Combine Meshes - YouTube

Tinkering with OpenShot for video editing | Opensource.com

PDFs

Open source PDF readers, creators, and editors | Opensource.com

Geolocation

3 open source alternative to desktop GIS tools | Opensource.com

Productivity_driven

Pomodoro Technique - Time Management - Wikipedia

List of IEEE milestones - Wikipedia
What is Flash? Adobe Flash, vs HTML 5, flash memory, SSD

Resources

All IT eBooks - Free IT eBooks Download
Free Knowledge Base- The DUCK Project: information for everyone
200 universities just launched 560 free online courses. Here’s the full list.
Karl Steltenpohl's Terminal
GitHub - jwasham/computer-science-flash-cards: Mini website for testing both general CS knowledge and enforce coding practice and common algorithm/data structure memorization.
6 Best Alternatives for The Pirate Bay
GitHub - sindresorhus/awesome: Curated list of awesome lists
Corkami · GitHub
Ken Williams Home Page
IT Books
Articles - Ciro Santilli
Andrew S. Tanenbaum, Professor at the Vrije Universiteit
GitHub - lancetw/ebook-1: A collection of classic computer science books from Internet

Jobs

More than 18,000 tech jobs announced across Ireland in 2018

Freelance

Freelancers_Management_Best_Practices

Tools_and_Sheets

Freelance_Tips

tips for using freelancer at DuckDuckGo
Use these Upwork tips at your own risk
17 Tips for Boosting Your Success on Upwork - Hiring | Upwork
New to Upwork? 9 Tips For a Successful Freelance Business
5 Tax Tips for U.S. Freelancers - Hiring | Upwork
Mistakes Freelancers Make When Setting Their Rates—and Ideas to Fix Them - Hiring | Upwork
Upwork Access Denied
10 Ways to Be More Professional on Upwork - Hiring | Upwork
How to make $1,000+ per week on Upwork — Jake Jorgovan
Upwork Tips: Essential Tips for Upwork and Other Freelance Job Boards - HomeWorkingClub.com
Tips and Tricks for Creating an Irresistible Upwork Profile - Freelancer Insights
Beginner’s Guide: How To Get More Freelance Jobs At Upwork
How To Get More Jobs On Upwork: 14 Tips
How to Get to the Top on Upwork - Laura Pennington
How to get your Upwork profile approved (even if you got rejected 10x)
10 Insanely Actionable Tips for Successful Freelancing (2018)

[Folder Name]

Freelancer.com Reviews - Is it a Scam or Legit?
Does the freelancer website really work or is it a scam? - Quora
Dashboard
How to Avoid Scams on Upwork and Freelancer | Screenshot Monitor Blog
8 ways to find legit freelance work | CIO
Top 25 Freelance Websites to Find Work in 2018
My Review of Freelancer.com Platform
is freelancer.com safe? | freelancer.com reviews |check freelancer.com for fraud and risk | is freelancer.com genuine or a scam
Is freelancer.com trusted? - Quora

caution freelancer payment at DuckDuckGo
Freelance or self-employed? Here’s how to survive | Money | The Guardian
15 Mistakes Businesses Make When Billing their Customers - Due
The Ultimate Guide To Getting Paid As A Freelancer (2018 Edition) - Double Your Freelancing
How to Avoid High PayPal Fees: A Trick for Freelancers
Freelancers: How Do You Get Paid? — SitePoint
How To Invoice Freelance Clients and Get Paid Online
How to Get Paid Online Without Losing Your Money or Your Mind | Be a Freelance Blogger
The Top 5 Ways to Pay Outsourced Employees & Freelancers
Problem loading page
How to receive payments: 14 tools for freelancers
7 PayPal Alternatives for Freelancers to Collect Payments in WordPress
Money Matters, Part 1 of 6: Declaring PayPal Income | Men with Pens
Freelance Rate Calculator by Double Your Freelancing
5 Options for Avoiding PayPal Fees & Keeping All Your Freelance Writing Pay - Freelance Writing Jobs | A Freelance Writing Community and Freelance Writing Jobs Resource
Freelance fees: hourly or per project?
The freelancer’s short guide to getting paid
is it mandatory to give debit card number to create paypal account at DuckDuckGo
Double Your Freelancing Rate - Double Your Freelancing
Is it safe to create a PayPal account by giving away the CVV number of a credit card and your bank account password for online banking? - Quora
The future of work in cyber security. Is it freelance? | Jane Frankland | Pulse | LinkedIn
Comment devenir freelance : Le guide de démarrage
Devenir freelance : le guide pour choisir son statut
devenir travailleur indépendant
15 logiciels de facturation pour gérer vos factures →
Freelance : 6 conseils pour éviter les impayés
Freelance, comment fixer vos tarifs ?
6 compétences pour devenir freelance
Comment trouver des clients ? 20 conseils à partager

Payment_Methods

Flattr - Creators
Payoneer: International Money Transfers: Quick, Secure & Low Cost
payoneer vs paypal at DuckDuckGo
Select How You Get Paid – Upwork Help Center

Legislation

Flag Theory for Offshore Companies, Banking, Passports & Residency
Complete List of Countries with No Taxes in 2017 - Flag Theory

French_Legislation

Taxes

À partir de quand un micro-entrepreneur est-il soumis à la CFE ? - professionnels | service-public.fr
Un micro-entrepreneur peut-il déduire ses charges ? abattement | Assistant-juridique.fr

Tax_Allowance

L'abattement du micro-BNC (bénéfices non commerciaux) | Le guide du micro-entrepreneur
Impôts : qu’est-ce qu’un abattement ?

Auto-Entrepreneurs : comment déclarer votre Impôt sur le Revenu 2019 ?

[Folder Name]

Centre de Formalités des Entreprises
Centre de Formalités des Entreprises
Bienvenue à l'Urssaf Provence-Alpes-Côte d'Azur - Urssaf.fr
Activité artisanale : documents à fournir lors de l'immatriculation | AFE, Agence France Entrepreneur
Le régime du micro-entrepreneur – Guichet-entreprises.fr
La demande d’Accre – Guichet-entreprises.fr
L’Aide aux Chômeurs Créateurs ou Repreneurs d’Entreprises (Accre) – Guichet-entreprises.fr
Aide au chômeur créant ou reprenant une entreprise (Accre) - professionnels | service-public.fr
En début d'activité, un micro-entrepreneur a-t-il droit au dispositif Accre ? - professionnels | service-public.fr
Aide aux chômeurs créateurs ou repreneurs d’une entreprise (ACCRE) - Ministère du Travail
Devenir travailleur indépendant sur le web : quel statut ?
Déclaration de micro-entrepreneur (auto-entrepreneur) - professionnels | service-public.fr
Micro-entrepreneur : que se passe-t-il en cas de dépassement du seuil du chiffre d'affaires ? - professionnels | service-public.fr
Organismes conventionnés
Régime auto-entrepreneur, quelles démarches pour adhérer ?
La liste des aides aux entreprises
Questions-Réponses
Demande d'aide à la création et à la reprise d'une entreprise (Accre) | service-public.fr
Micro-entrepreneur : quand déclarer son chiffre d'affaires ? - professionnels | service-public.fr
Combien coûte la création d'une entreprise ou la déclaration d'une activité? - professionnels | service-public.fr
Devenir freelance : le guide pour choisir son statut
Se déclarer autoentrepreneur : comment faire ?
Portail officiel des micro-entrepreneurs
Comment déclarer votre activité d’auto-entrepreneur ?
Pas à pas 9 : Option pour l’EIRL
Pas à pas 10 : Votre protection sociale
Comment déclarer ? Choix du prélèvement fiscal libératoire
Comment calculer vos cotisations ?
Auto-entrepreneur et salarié: le cumul est-il possible?
Cotisations sociales des entrepreneurs : comparaison entre le régime des TNS et celui des salariés | AFE, Agence France Entrepreneur
Tout savoir sur le régime micro-entrepreneur, auparavant dénommé auto-entrepreneur | AFE, Agence France Entrepreneur
Mentions obligatoires sur une facture - professionnels | service-public.fr
Factures : quelles sont les mentions obligatoires?
CEDEF - Quelles sont les mentions obligatoires à faire figurer sur une facture ? | Le portail des ministères économiques et financiers
recruter salarié vs recruter freelancer - Google Search
Recruter un freelance ou un salarié : quelles différences ?
Recruter un freelance, l’essentiel à savoir
Pourquoi avez-vous intérêt à recruter un indépendant pour votre entreprise
Quels avantages à travailler avec un freelance plutôt que d'embaucher ?
Les entreprises préfèrent avoir recours à des indépendants plutôt que d’employer des salariés
Startup : faut-il embaucher un salarié ou un freelance ?
Micro-entrepreneur ou auto-entrepreneur | AFE, Agence France Entrepreneur
Accueil \ EIRL.fr
L'entrepreneur individuel à responsabilité limitée (EIRL) | AFE, Agence France Entrepreneur
IS ou IR ? Choix du régime fiscal de l'entreprise

ACCRE

Les aides financières à la création de micro-entreprise : tout savoir
Aide financière auto-entrepreneur
Quels documents pour le dossier ACCRE ?
Remplir et envoyer votre formulaire de demande d'ACCRE
Le guide pour compléter le formulaire ACCRE
Chômage: les conditions pour être indemnisé 
Quelles sont les conditions pour avoir droit aux allocations chômage ? | Unedic.fr
ACCRE et ARCE : faut-il choisir ? comment ça se passe ? 🤔 -

VAT

Numéro de TVA intracommunautaire - professionnels | service-public.fr
Demande d'attribution d'un numéro de TVA intracommunautaire à un assujetti non redevable | service-public.fr
TVA Auto-Entrepreneur : tout comprendre
Facture auto-entrepreneur et TVA : bien comprendre
Auto-entrepreneur : faut-il mettre la TVA sur les factures ?
Comprendre le mécanisme de la TVA pour les entreprises
TVA auto-entrepreneur 2019 : comment faire sa déclaration ?
Les taux de TVA en 2019 : 0%, 5.5%, 10% ou 20% ?
Auto-entrepreneurs : sur quels achats peut-on déduire la TVA ?

Prevelement_a_la_source

Prélèvement à la source : les indépendants aussi sont concernés

Expenses_Recovering

Auto-entrepreneur : comment déduire vos frais professionnels ? - &vous
Comment déduire ses frais professionnels en auto-entrepreneur ? - débours
Le remboursements de frais en auto-entreprise - débours

La mission d'un expert-comptable, son rôle : tout comprendre
Dépassement seuils chiffre d'affaires auto-entreprise : tout savoir
Statut auto-entrepreneur : 7 avantages et 6 inconvénients
Augmentation du plafond auto-entrepreneur : tout savoir (2019)
Les AE déboursent pour leurs clients mais oublient les débours - AutoEntrepreneur.fr
Auto-entrepreneur : les changements et nouveautés 2019

Taxes – Upwork Help Center
taxes on donations received at DuckDuckGo
The Difference Between a Freelancer and an Entrepreneur | OPEN Forum
what is a vat at DuckDuckGo
impôts sur les dons at DuckDuckGo
VAT identification number - Wikipedia
EU Value Added Tax (VAT) – Upwork Help Center

Professional_Insurances

Hiscox, l’assurance RC pro sur-mesure pour activités libérales
Responsabilité civile professionnelle informatique | Hiscox

Professional_Banking

Banque auto entrepreneur : comparatif meilleures banques en ligne 2019
AUTO-ENTREPRENEURS – La Banque Postale

The 15 Best Freelance Websites to Find Jobs
Log in | Toptal
| Deliver Faster Through Crowdsourcing | Topcoder
💬1 - Plateforme des experts freelances du numérique - XXE

7 tips for promoting your project and community on Twitter | Opensource.com
How to make money online

Mathematics

Probability

Math Forum - Ask Dr. Math
How to know when to 'add' and when to 'multiply' in questions based on probability - Quora
Why do we multiply instead of adding in combinations? - Quora

Algebra

Boolean_Algebra

Boolean algebra (structure) - Wikipedia
Lattice (order) - Wikipedia
Complemented lattice - Wikipedia

Numeral_Systems

decimal_system

why base 10 numeration system is the most popular at DuckDuckGo
Why have we chosen our number system to be decimal (base 10)? - Mathematics Stack Exchange
Why do we use decimal system? - Mathematics Stack Exchange
Is '$10$' a magical number or I am missing something? - Mathematics Stack Exchange
Math Forum - Ask Dr. Math

Digits_Order_In_Positional_System

math history - Why are numbers written in descending order? - Mathematics Stack Exchange
Why are numbers ordered the way they are? - Mathematics Stack Exchange
why binary is read right to left - Mathematics Stack Exchange

Babylonian numerals - sexagesimal (base-60) first known positional numeral system inherited from either the Sumerian or the Eblaite civilizations
Hindu-Arabic numeral system - Wikipedia
Positional notation - place value numeral systems - base conversion - Wikipedia
Non-standard positional numeral systems - negative/complex base/radix - mixed base/radix
Octal - PDP-8/11 - Motorola 68000 - Unix file permissions
Unary numeral system - Wikipedia
number theory - Does radix 1 exists? - Mathematics Stack Exchange
0 - Wikipedia
Sign (mathematics) - Wikipedia
Numeral system - Wikipedia
0 - zero - Wikipedia
Definitive List of numeral systems - Standard/Non-standard positional numeral systems - signed digit representation, balanced ternary, negative bases, negabinary, complex bases, non integer bases, n-adic number, mixed radix/base - non-positional notation, babylonian/roman
Non-adjacent form - signed-digit representation - non standard positional numeral system - cryptography
List of numeral system topics - Wikipedia
Maya numerals - vigesimal (base-20) positional numeral system
Mixed radix - non-standard positional numeral systems in which the numerical base varies from position to position
Factorial number system - combinatorics, the factorial number system, also called factoradic, is a mixed radix numeral system adapted to numbering permutations. It is also called factorial base
Negative base/radix - Negabinary - implementation - non-standard positional numeral system
Non-integer representation - Wikipedia
Roman numerals - Wikipedia

Linear_Algebra

linear algebra - Why, historically, do we multiply matrices as we do? - Mathematics Stack Exchange
Difference Between Dot Product and Cross Product - DifferenceBetween.com
difference between dot product and inner product - Mathematics Stack Exchange
vector algebra: dot product and cross product - Mathematics Stack Exchange
What is the main difference between a dot product and a cross product? - Quora
Inner product space - vector space with structure associating each pair of the space's vector to their inner/scalar/dot product - Wikipedia
Dot product - scalar product - called Inner /Projection Product in Euclidean Geometry - Wikipedia
Cross product - Wikipedia
Hermitian matrix - Wikipedia
Tensor product - Wikipedia
Adjugate/Classical Adjoint/Adjunct matrix - transpose of cofactor matrix - Wikipedia
Linear map - Application linéaire - Wikipedia
Transpose of a matrix - Wikipedia
Matrix multiplication - Wikipedia
matrices - Intuition behind Matrix Multiplication - Mathematics Stack Exchange
Norm (mathematics) - inner product
Complex number - norm, argument
linear algebra - What is the norm of a complex number? - Mathematics Stack Exchange
Relationship between inner product and norm - Mathematics Stack Exchange
Outer product - Wikipedia
What is an intuitive understanding of the outer product of two vectors? - Quora
Tensor - Wikipedia

Radix - numeral base
Method of complements - radix complement/diminished radix complement - Generalization of two's complement - ten's complement, nines complement - substraction giving negative result, with subtrahend greater than minuend - Wikipedia
arithmetic - Proof of the standard algorithm for addition? carry method proof along the way - Mathematics Stack Exchange
Radix economy - numeral base - ternary tree
associativity in mathematics at DuckDuckGo

Logic

Vacuous_Truth

Vacuous truth - Wikipedia
logic - What precisely is a vacuous truth? - Mathematics Stack Exchange
elementary set theory - Quantification over the empty set - Mathematics Stack Exchange
logic - Vacuous Truth and Universal Conditional Statements - Mathematics Stack Exchange
logic - Intuition behind Vacuous proofs - Mathematics Stack Exchange
Empty set - Vacuous Truth

CONDITIONAL ASSERTIONS
Material conditional - Wikipedia
Strict conditional - Wikipedia
elementary set theory - Why is "for all $x\in\varnothing$, $P(x)$" true, but "there exists $x\in\varnothing$ such that $P(x)$" false? - Mathematics Stack Exchange
Contraposition - Wikipedia
Proof by contrapositive - Wikipedia
Modus tollens - Wikipedia
CS2742 -- Logic for Computer Science - academic course -

Set_Theory

Cartesian product - Wikipedia
Permutation - arranging members of a set

Secret Link Uncovered Between Pure Math and Physics | Quanta Magazine
Mathematicians Find Wrinkle in Famed Fluid Equations | Quanta Magazine
Total order - Wikipedia
Online LaTeX Equation Editor - Useful for stackexchange post - create, integrate and download

Order_Theory

Upper and lower bounds - Wikipedia
Order theory - Wikipedia

Calculus

Partial function - total function
Recursive set - In computability theory, a set of natural numbers is called recursive, computable or decidable if there is an algorithm which takes a number as input, terminates after a finite amount of time (possibly depending on the given number) and correctly decides whether the number belongs to the set or not.
Geometric series - formula of sum of the first n terms of a geometric series
Geometric progression - Wikipedia
Rounding - Arrondi - ceiling/round up - flooring/round down -Wikipedia
Fundamental theorem of calculus - Wikipedia
exponentiation - Why does any nonzero number to the zeroth power = 1? - Mathematics Stack Exchange
Zero to the power of zero - IEEE 754-2008 floating-point standard - C, C++
Empty product - Wikipedia
Exponentiation - Wikipedia
intuition - Numbers to the Power of Zero - Vectornaut definitive answer -
Is [math]\sqrt[x]{x}^{{{{{{\sqrt[x]{x}}^{\sqrt[x]{x}}}^{\sqrt[x]{x}}}^{\sqrt[x]{x}}}^{\sqrt[x]{x}}}^\cdots}=x[/math] true? - Quora
Natural logarithm - Wikipedia
Logarithm - inverse of exponentiation
Base (exponentiation) - Wikipedia
Transcendental number - proof sketch that e is transcendental
e (mathematical constant) - base of natural logarithm
logarithms - log base 1 of 1 - related to division by zero 0 - definitive intuitive proof
logarithms - The difference between log and ln - common base 10 vs natural base e logarithm

Resources

The On-Line Encyclopedia of Integer Sequences® (OEIS®)
thyme/math at master · djtrack16/thyme · GitHub

Arithmetics

Prime Numbers | Brilliant Math & Science Wiki
Variants of induction
Induction
Modular arithmetic - modulo - congruence

Lattice (group) - Wikipedia

Physics

Geology

As Earth's rotation slows, 2018 could see a spike in large earthquakes — Quartz
The Earth is making a weird noise, and researchers have no idea why – BGR

Astrophysics

How plausible is Elon Musk’s plan to colonize Mars?
Astronomers are puzzled by a huge object at the centre of our galaxy - ScienceAlert
What is dead may never die | Astronomy.com
Bill Nye was asked "If the sun is hot, why is space cold?" on Reddit. Here's why. — Quartz
The Alien Observatory --"Ten Undiscovered Worlds are Favorably Located to Detect Earth" (WATCH Video) - The Daily Galaxy --Great Discoveries Channel
Codename Zuma: All about SpaceX's secret launch
Hacker says NASA is editing out UFOs from the videos before releasing them » TechWorm
Enceladus heats up because its core is like a sponge | Ars Technica
Russians claim they’ve found the first extraterrestrial life, and it was right under our noses – BGR
Space station bacteria 'come from outer space,' cosmonaut says - CNET
Astronomers Are Gearing Up to Listen for Evidence of Aliens from a Mysterious Interstellar Object

Electricity

Articles on "Electricity" WJ Beaty
Electrical cable - Wikipedia

Resources

Les Podcasts de l'Université de Grenoble » Université de Savoie

"Quark Fusion" Produces Eight Times More Energy Than Nuclear Fusion
Physicists just found a loophole in graphene that could unlock clean, limitless energy - ScienceAlert
IceCube turns the planet into a giant neutrino detector – Ars Technica
Experiment demonstrates quantum mechanical effects from biological systems
Secret Link Uncovered Between Pure Math and Physics | Quanta Magazine
Newly discovered property of graphene could lead to infinite clean energy | Inhabitat - Green Design, Innovation, Architecture, Green Building
New quantum liquid crystals may play role in future of computers
Scientists Have Discovered a New Form of Matter Called "Excitonium"
Engineers create artificial graphene in a nanofabricated semiconductor structure
This breakthrough in tractor beam tech could pave the way to levitating humans
Generalized Hardy's paradox shows an even stronger conflict between quantum and classical physics
Quantum Memory Storage is More Efficient and Secure Than Ever

Financial

I Will Teach you to be Rich - Ramit Sethi - pdf
كيف تحسب زكاة المال
Ultralight personal aircraft | Plane4You Aircraft Sales Center

Geopolitics

List of multinational companies with research and development centres in Israel - Wikipedia
The National Interest - warfare, cyberwarfare, geopolitics
constitution - Interdependence and independence of powers - Politics Stack Exchange
democracy - How do democracies maintain the independence of judiciary? - Politics Stack Exchange

Linguistics

Lessons_and_Articles

Arabic

English

I'd better vs I better - English Language & Usage Stack Exchange
When to use "If I was" vs. "If I were"? - English Language & Usage Stack Exchange
Compare with or compare to? | Oxford Dictionaries
grammar - How to use "to + V-ing"? - English Language & Usage Stack Exchange
best app to learn English grammar - Google Search
Question - Quora
best app to learn English grammar - Google Search
The English language: All the difficult pronunciations of English in "The Chaos" poem by Gerard Nolst Trenité — Quartz
Scripps National Spelling Bee: What makes the winning words so hard? — Quartz
Telling The Time in English – English Study Page
possessives - When a word ends in 's' or 'x', do you add 's or just an '? - English Language Learners Stack Exchange
# Number sign - dièse - pound sign, hash - Symbols definitive list - english names and pronounciation
word usage - have difficulty vs have hard time vs have trouble vs struggle - English Language Learners Stack Exchange
word choice - Difference between "computation" and "calculation" - English Language & Usage Stack Exchange

Japanese

which alphabet Japaneses use the most - Google Search
if you speak Japanese can you speak Chinese - Google Search
how to pronounce Japanese correctly - Google Search
how to learn japanese by watching anime - Google Search
Learn Japanese – Tae Kim's Guide to Learning Japanese
why do japanese not use only kanjis - Google Search
which alphabet Japaneses use the most - Google Search
if you speak Japanese can you speak Chinese - Google Search
how to pronounce Japanese correctly - Google Search

Hebrew

ברוכה pronunciation: How to pronounce ברוכה in Hebrew

Arabic

What's the difference between a tonal language and a pitch accent language? - Quora

Translators

Thesaurus - Defs & Synonyms
Idioms and phrases

Medias

BEST THRILLERS!!!! NOW-2018 - IMDb
Diriliş: Ertuğrul - Season 4 - Watch Full Episodes for Free on WLEXT
Watch Movies Online Free - hdonline.to
Home - Animelon
Baki (2018) at Gogoanime
Read Attack on titan/Shingeki no kyojin Manga
Watch Redbad For Free On hdonline.to

Games

Far Cry 5 (Region Free) PC Download - Nitroblog
Far Cry 5 (v1.4.0.0, MULTi15) [FitGirl Repack, Selective Download] from 15.5 GB : CrackWatch
Nitroblog - PC PS3 VITA WII ISO ROM Download

18 Best Free Movie Streaming Sites Without Sign Up 2020
FMovies | Watch Movies Online Free on FMovies.to
FMovies | Watch Angel Heart (1987) Online Free on fmovies.wtf

أفضل التطبيقات المجانية لتعّلم اللغات عبر هاتفك الذكي
Linguee | Dictionary for German, French, Spanish, and more
Thesaurus.com | Synonyms and Antonyms of Words at Thesaurus.com

Calisthenics

Paul Wade | PCC Blog
The Tao of PCC by Paul Wade | PCC Blog
Paul Wade | PCC Blog - Part 2
Paul Wade | A Dirty Dozen - bodyweight alternatives for free weight exercises - rope climbing - hamstrings - cardio training
Al Kavadlo’s Blog | Al Kavadlo | Calisthenics Workouts & Bodyweight Exercises
Amazon.com: Rough Strength Files: 42 Ideas on Low-Tech Strength Training eBook: Alex Zinchenko, Paul Wade: Books
Amazon.com: Mental Muscle: How to Use the Full Power of Your Mind to Develop Superhuman Strength eBook: Logan Christopher, Paul Wade: Books
Amazon.com: Diamond-Cut Abs: How to Engineer The Ultimate Six-Pack--Minimalist Methods for Maximal Results eBook: Danny Kavadlo, Paul Wade: Books
Cartographie des méduses en Région PACA - jellyfishes

Misc

Tony Ferguson Strength Training Highlights | Training World - YouTube
5 Ways To Boost Collagen For Tendon And Ligament Strength - Furthermore
Testosterone: What You Need To Eat For Better T-Levels
The Prepping Guide: Survival Planning, SHTF Plans & Doomsday Prep
Prepare Your Hamstrings for Sprinting With This Warm-Up Drill | STACK
Proper Warm-up for Sprinting
Tip: Prepare Your Hamstrings for Sprinting | T Nation
The Perfect Warmup For Speed Workouts – PodiumRunner
4 Exercises to Strengthen Weak Hamstrings | STACK
Why Your Hamstring Stretching Routine Isn't Working | STACK

Other

DEVENIR INÉPUISABLE EN 7 MINUTES SANS MATÉRIEL - cardiovascular training
RCH-01 | RepliCel - hair loss treatment
Hair Transplants: All Your Questions Answered
Eight baldness cures that could soon put an end to your hair loss woes
After Hair Transplantation | Dr Serkan AYGIN Clinic | Dr Serkan Aygin Clinic
How Do You Choose the Best FUE Hair Transplant Doctor? | FUE Magazine
All You Need to Know: A Guide to Hair Transplant in Turkey - choosing right clinic
Hair Transplant – Why You Might NOT Regret Being Bald in 2018
5 Factors That Contribute to a “Failed Hair Transplant” | Dr Serkan Aygin Clinic
8 Things About Hair Transplantation | Dr Serkan Aygin Clinic
Comment éviter et faire disparaitre les cheveux blancs naturellement-Coloration et traitement - Mon Huile essentielle
Les masques à l'huile de ricin - Le guide beauté cheveux
Top 9 Oils That Are Good For Forestalling Gray Hair | Gaizupath
White Hair Treatment, Let Natural Herbs Work On Your Scalp | Gaizupath
Les 5 bienfaits de l’huile d’argan - Secrets de Miel
3 recettes de soin cheveux maison pour cheveux secs - Biba
Is argan oil good for sensitive acne prone skin? - Quora

Georges St-Pierre - The Best Training in One Video!!! - YouTube
Imbalances in muscle and tendon strength and the relation with injuries and performance
Imbalances in the Development of Muscle and Tendon as Risk Factor for Tendinopathies in Youth Athletes: A Review of Current Evidence and Concepts of Prevention - definitive
Exercise Strengthens Your DNA - Men's Journal
Regular Exercise Induces Changes in DNA
Sports Injury Prevention Tips

Travelling

Travel Resources & Budget Tips • Expert Vagabond
Home | Official ESTA Application Website, U.S. Customs and Border Protection
Green Cards and Permanent Residence in the U.S. | USAGov
Barcelona Boat Party ~ The 4 Best Party Cruises for 2019 (with photos!)
How long can a B1/B2 visa holder stay in the US?

Car_Renting

Car Rentals from Avis, Book Online Now & Save | Avis Car Rental | Avis Rent a Car

Places_To_Visit

US

Georgia

7 Places in Georgia You Have to Visit That You Didn't Know Existed

travel to europe by ship - Google Search
www.businessinsider.com
travel to europe by ship - Google Search
How to Travel to Europe by Boat | USA Today
freighterworld.com - freighterworld Resources and Information.
Transatlantic Freighter Travel
Freighter Cruises
Iconic Transatlantic cruises 2018 & 2019 - Cunard
travel to europe by ship - Google Search
www.businessinsider.com
www.businessinsider.com
How to Keep Your Sanity at the Airport This Holiday Season | Travel + Leisure
The simple trick to ensuring your bag is first at the carousel
5 TSA-Approved Hacks for Holiday Travel | MyDomaine
Where to Rent a Car Using a Debit Card | USA Today
Formulaire ESTA | Office du tourisme des USA - travel
Passeport, ESTA, Visa | Préparez votre voyage aux Etats-Unis avec l'Office du Tourisme des USA.
8 Steps To Freedom: How I Quit My Job And Traveled The World - Lifestyle & Travel Blog

Administrative

USA internship

Flights

adioso

Room_rent

Remotely Exploitable Flaw Found In HP Enterprise Printers—Patch Now

Stage USA - Conseils, Offres de stage, Visa J-1
Blog MyInternshipAbroad - Tous nos conseils pour trouver un stage à l'étranger
L'Etudiant Voyageur - Webzine du voyage étudiant
FSDIE Social - Crous Aix Marseille Avignon

Search Ireland's No. 1 Property Website | apartment rental
Compensation: Cashing out Facebook relocation benefits - Blind
5 Things to Ask for Before Relocating for a New Job-The Muse
What Should A Relocation Package Include?
What does Twitter or Facebook offer in terms of relocation benefits for new employees? - Quora
Relocation Packages in Tech. Industry Insights from Relocate.me | Relocate.me Blog
Facebook Gives Employees Big Money to Move Closer to Work – Fortune
What are all the perks that Facebook employees get? - Quora

todownload

Click Here to Kill Everybody: Security and Survival in a Hyper-connected World pdf at DuckDuckGo
HP Gaming PCs - HP OMEN Family | HP® Official Site
Razer Gaming Laptops and Ultrabook - Blade, Blade Stealth, and Blade Pro | Razer Europe
Books - Shichao's Notes
The Legacy Code Programmer's Toolbox is Out - Fluent C++
What Math Do You Need To Read The Art Of Computer Programming? - Stack Overflow
Reusable Firmware Development filetype:pdf at DuckDuckGo
Java Network Programming, 3rd Edition
Android Development Patterns
WebAssembly in Action
How Linux Works, 2nd Edition - pdf - Free IT eBooks Download
Effective awk Programming, 4th Edition
Beginning Git and GitHub
Deep Learning Pipeline
LearnCKR/The C Programming Language - 2nd Edition - Ritchie Kernighan.pdf at master · kusti8/LearnCKR · GitHub
Unit Testing Principles, Practices, and Patterns - pdf - Free IT eBooks Download
Programming Persistent Memory - pdf - Free IT eBooks Download
Azure Internet of Things Revealed
Software Security: Building Security In - PDF Free Download
Introducing Algorithms in C - pdf - Free IT eBooks Download
The CERT ® Oracle ® Secure Coding Standard for Java ™ - The CERT Oracle Secure Coding Standard for Java [Long, Mohindra, Seacord, Sutherland & Svoboda 2011-09-18].pdf
Practical Rust Projects - pdf - Free IT eBooks Download
Basic Math for Game Development with Unity 3D - pdf - Free IT eBooks Download
Serverless Programming Cookbook
Download ePub (2.3 MB)
Download PDF (4.2 MB)
Regular Expression Recipes for Windows Developers - pdf - Free IT eBooks Download
The Architecture of Privacy - pdf - Free IT eBooks Download
BeagleBone for Secret Agents - pdf - Free IT eBooks Download
Waging Cyber War - pdf - Free IT eBooks Download
The Secret Life of Programs - pdf - Free IT eBooks Download
Linux Hardening in Hostile Networks Kyle Rankin filetype:pdf at DuckDuckGo
Software Build Systems: Principles and Experience - pdf - Free IT eBooks Download
The IoT Hacker's Handbook - pdf - Free IT eBooks Download
https://the-eye.eu/public/Books/HumbleBundle/cryptography_engineering_design_principles_and_practical_applications.pdf
Practical Artificial Intelligence - pdf - Free IT eBooks Download
Web Security for Developers - pdf - Free IT eBooks Download

Local_Resources

Systems - Networks Pwning

0.2014_FSU-OffensiveComputerSecurity_syllabus.pdf
01_FSU-OCS_Introduction-slides.pdf
02.FSU-OCS_Essential_C_Security_101-slides.pdf
03.FSU-OCS_Essential_C_Security_102-slides.pdf
Understanding_Integer_Overflow_in_C-Cpp.pdf
Startpage.com - The world's most private search engine
Hacking; The Art of Exploration - Hacking-The_Art_of_Exploitation-2nd_Ed-2008.pdf
Startpage.com - The world's most private search engine
Secure_Coding_C_Cpp-2ndEd-2013-Seacord.pdf
Practical_Malware_Analysis-2012-Sikorski-Michael.pdf
The_Shellcoders_Handbook_2ndEd-2007.pdf
The Web Application Hacker's Handbook - The_web_application_hackers_handbook-2ndEd-2011-Stuttard_Pinto.pdf
Startpage.com - The world's most private search engine
Guide to Computer Network Security, 3rd edition-2015.pdf
Building Secure and Reliable Systems - Building_Secure_and_Reliable_Systems-2020-Google.pdf
Handbook of Communications Security - Handbook of Communications Security.pdf
Introduction to Computer Networks and Cybersecurity_2013.pdf
Network Attacks and Defenses- A Hands-on Approach-2013.pdf
Network Attacks & Exploitation: A Framework - Network Attacks and Exploitation A Framework.pdf
The Fundamentals of Network Security - The Fundamentals of Network Security_2001.pdf
Attacking Network Protocols - Attacking-Network-Protocols-A-Hacker-s-Guide-to-Capture-Analysis-and-Exploitation.pdf
Wireshark® for Security Professionals - Wireshark-for-Security-Professionals-Using-Wireshark-and-the-Metasploit-Framework.pdf
NTP Security.pdf
Startpage.com - The world's most private search engine
www.lib.ommolketab.ir - Practical_Unix_And_Internet_Security-3rdEd-2003-Garfinkel.pdf
Linux_Security_Cookbook-2003-Barrett_Byrnes_Silverman.pdf
Practical Linux Security Cookbook - Practical_Linux_Security_Cookbook-2016-Kalsi.pdf
Linux Basics for Hackers - Linux_Basics_For_Aspiring_Hackers-2018-OccupyTheWeb.pdf
System Administration Ethics.pdf
Linux Firewalls - Linux_Firewalls-2007-Rash.pdf
Windows Internals, Sixth Edition, Part 1 eBook - Windows_Internals_Part1-6thEd-2012-Russinovitch.pdf
Windows Internals, Sixth Edition, Part 2 eBook - Windows_Internals_Part2-6thEd-2012-Russinovitch.pdf
Startpage.com - The world's most private search engine
Abusing the Internet of Things - Abusing the Internet of Things Blackouts, Freakouts, and Stakeouts.pdf
Defending IoT Infrastructures with the Raspberry Pi.pdf
Demystifying Internet of Things Security.pdf
Introduction to Hardware Security and Trust - Introduction to Hardware Security and Trust.pdf
Practical Internet of Things Security - Practical Internet of Things Security_2016.pdf
The_IoT_Hacker-s_Handbook-2019-Gupta.pdf
Startpage.com - The world's most private search engine
Counterterrorism and Cybersecurity_2013.pdf
Digital Security: Cyber Terror and Cyber Security - Digital Security- Cyber Terror and Cyber Security_2010.pdf
Handbook of Computational Approaches to Counterterrorism_2013.pdf
Inside Cyber Warfare - Inside Cyber Warfare, 2nd Edition.pdf
Transnational Security.pdf
Waging Cyber War.pdf
Startpage.com - The world's most private search engine
Certified Ethical Hacker Foundation Guide-2016.pdf
CEH v10 Certified Ethical Hacker Study Guide.pdf
CEH v9 Certified Ethical Hacker Version 9-2016.pdf
CEH v9 Certified Ethical Hacker Version 9_Study_Guide-2016.pdf

Reverse Engineering - Binary Exploitation - Secure Coding

Hacking-The_Art_of_Exploitation-2nd_Ed-2008.pdf
Startpage.com - The world's most private search engine
Learning Linux Binary Analysis - Learning Linux Binary Analysis_2016.pdf
Practical_Malware_Analysis-2012-Sikorski-Michael.pdf
Practical_Reverse_Engineering-Dang_Gazet-2014.pdf
RE4B-Dennis_Yurichev.pdf
Beginning%20x64%20Assembly%20Programming-2019.pdf
The_Shellcoders_Handbook_2ndEd-2007.pdf
Your_Code_as_a_Crime_Scene-2015.pdf
Digital Forensics Basics.pdf
Practical Digital Forensics - Practical Digital Forensics.pdf
The Art of Memory Forensics - The_Art_of_Memory_Forensics-2014-Walters_Levy_Case.pdf
Startpage.com - The world's most private search engine
The Art of Software Security Assessment - Identifying and Preventing Software Vulnerabilities.pdf
Secure_Coding_Principles_and_Practices-2003-Graff_VanWyk.pdf
software-security-building-security-in.pdf
ISO-IECJTC1-SC22-WG23_N0868-tr24772-1-language-independent-guidance-for-formal-editing-20190225 - ISO-IECJTC1-SC22-WG23_N0868-tr24772-1-language-independent-guidance-for-formal-editing-20190225.pdf
ISO-IECJTC1-SC22-WG23_N0870-tr24772-3-C-vulnerabilities-for-formal-editing-20190225 - ISO-IECJTC1-SC22-WG23_N0870-tr24772-3-C-vulnerabilities-for-formal-editing-20190225.pdf
Secure_Coding_C_Cpp-2ndEd-2013-Seacord.pdf
Secure_Programming_C_Cpp_Java_Perl_PHP_Python_Tcl_and_Ada95-2015-Wheeler.pdf
Secure_Programming_Cookbook_for_C_and_Cpp-2013-Viega.pdf
Security for Web Developers - Security for Web Developers_2016.pdf
Cryptography_in_C-Cpp-2nd_Edition-2013.pdf
Building Secure Defenses Against Code-Reuse Attacks.pdf
Secure Development for Mobile Apps
Startpage.com - The world's most private search engine
0132936593.pdf - Computer_Organization_and_Architecture-9thEd-2013-Stallings.pdf
Hacker's Delight 2nd Edition.pdf
ProgrammingGroundUp_0-8.pdf
0132633760.pdf - Structured_Computer_Organization-5thEd-2007-Tanenbaum.pdf
The Secret Life of Programs.pdf
What Every Programmer Should Know About Memory - What_Every_Programmer_Should_Know_About_Memory-2007-Drepper-RedHat.pdf
Computer_Organization_and_Design-5thEd-2014-Patterson_Hennessy.pdf
Advanced_C_and_Cpp_Compiling-2014-Stevanovic.pdf
Assembly_Language_for_x86_Processors-7thEd-2015-Irvine.pdf
Beginning x64 Assembly Programming.pdf
Linkers and Loaders - Linkers_And_Loaders-1999-John_Levine.pdf
Low-Level_Programming-2017-Zhirkov.pdf
Modern_X86_Assembly_Language_Programming-2014-Kusswurm.pdf
Professional assembly language - Professional Assembly Language-2005.pdf
Stack_Frames-2016-Cataldo.pdf
Startpage.com - The world's most private search engine
21st Century C - 21st Century C, 2nd Edition.pdf
Le_langage_C-Garreta.pdf
Modern CModern C - Modern_C-2018-Gustedt.pdf
Modern_C_Quick_Syntax_Reference_2ndEd-2019-Olsson.pdf
ebook - The C Programming Language Ritchie & kernighan -.doc - The_C_programming_language_Ritchie-Kernighan.pdf
Expert C Programming - Expert_C_Programming-Van_Der_Linden.pdf

Web Security - Pentesting

The Web Application Hacker's Handbook - The_web_application_hackers_handbook-2ndEd-2011-Stuttard_Pinto.pdf
The_Browser_Hackers_Handbook_2014.pdf
Hacking Exposed™ Web Applications - Hacking_Exposed_Web_Applications-3rdEd-2011.pdf
The Hacker Playbook - Practical Guide To Penetration Testing.pdf
Advanced API Security-2ndEdition-2020
OWASP Application Security Verification Standard 4.0 - OWASP Application Security Verification Standard 4.0-en.pdf
OWASP Top 10 - 2017 - OWASP_Top_10-2017_(en).pdf.pdf
Python Web Penetration Testing Cookbook.pdf
Web_Penetration_Testing_with_Kali_Linux-2013-Muniz-Lakhani.pdf
Bug Bounty Hunting for Web Security.pdf
From Hacking to Report Writing.pdf
Startpage.com - The world's most private search engine
Hacking Point of Sale-2014.pdf
Secure Your Node.js Web Application.pdf
Securing SQL Server.pdf
Pro PHP Security - 2nd Edition
Identity_Attack_Vectors

Cryptography - Privacy - Anonymity

book.dvi - Introduction_to_Modern_Cryptography-2007.pdf
Applied Cryptography - Applied_Cryptography-2ndEd-1995-Schneier.pdf
Cryptography Engineering: Design Principles and Practical Applications - Cryptography_Engineering-2010-Schneier_Ferguson_Kohno.pdf
Introduction to Cryptography - Principles and Applications-2007.pdf
Handbook_of_applied_cryptography-1996.pdf
Cryptology_course-Ritzenthaler.pdf
013335475X.pdf - Cryptography_and_Network_Security-6thEd-2013.pdf
Algorithmic_Cryptanalysis-2009-Joux.pdf
Codage_cryptologie_et_applications.pdf
Cryptographic Hardware and Embedded Systems -- CHES 2015.pdf
Financial Cryptography and Data Security.pdf
Visual Cryptography and Secret Image Sharing.pdf
Startpage.com - The world's most private search engine
Hacking; The Art of Exploration - Hacking-The_Art_of_Exploitation-2nd_Ed-2008.pdf
9780133048377.pdf - Computer_Networks-5thEd-2011-Tanenbaum.pdf
Startpage.com - The world's most private search engine
Cryptography_in_C-Cpp-2nd_Edition-2013.pdf
Startpage.com - The world's most private search engine
The Architecture of Privacy.pdf
Defensive Security Handbook - Defensive Security Handbook.pdf
Personal Cybersecurity.pdf
Self-encrypting_deception-weaknesses_in_the_encryption_of_SSDs.pdf
PGP-GPG-2006.pdf
Dark Web- Exploring and Data Mining the Dark Side of the Web_2012.pdf
Tor_Networking_Vulnerabilities_and_Breaches.pdf


Coding Challenges

Cracking_The_Coding_Interview-6thEd-2015-McDowell.pdf
Startpage.com - The world's most private search engine
Introduction to Algorithms, Third Edition - Introduction_to_algorithms_ed3-Cormen-Liveist.pdf
Algorithms: A Top-Down Approach - Algorithms_A_Top-Down_Approach-Rodney_Howell.pdf
The_Art_of_Computer_Programming-Vol1-Knuth.pdf
Art of Computer Programming Knuth vol v2 - The_Art_of_Computer_Programming-Vol2-2ndEd-1981-Knuth.pdf
Foundations_of_Computer_Science-1992-Alho-Ullman.pdf
algorithms_cheats.pdf
Startpage.com - The world's most private search engine
21st_Century_C-2015-2ndEd-Klemens.pdf
Le_langage_C-Garreta.pdf
Modern CModern C - Modern_C-2018-Gustedt.pdf
Modern_C_Quick_Syntax_Reference_2ndEd-2019-Olsson.pdf
ebook - The C Programming Language Ritchie & kernighan -.doc - The_C_programming_language_Ritchie-Kernighan.pdf
Expert C Programming - Expert_C_Programming-Van_Der_Linden.pdf
Advanced_Topics_in_C-Core_Concepts_Data_Structs-2013-Kalicharan.pdf
Startpage.com - The world's most private search engine
Cpp17_Standard_Library_Quick_Reference-2ndEd.pdf
The C++ Programming Language - The_Cpp_programming_language_4th-Stroustrup.pdf
The C++ Standard Library: A Tutorial and Reference - The_Cpp_standard_library_a_tutorial_and_reference-2nd_ed-Nicolai_m_Josuttis.pdf
Effective Modern C++ - Effective_Modern_Cpp-2015-Scott_Meyers.pdf
Clean_Cpp-2017-Roth.pdf
Startpage.com - The world's most private search engine

Development Projects

Modern C++ Programming with Test-Driven Development - Modern_Cpp_Programming_with_Test_Driven_Development-2013-Langr.pdf
Beginning_Cpp17-5th_Edition.pdf
C++ Primer, Fifth Edition - C++ Primer, 5th Edition.pdf
The C++ Programming Language - The_Cpp_programming_language_4th-Stroustrup.pdf
Cpp17_Standard_Library_Quick_Reference-2ndEd.pdf
Design_Patterns_in_Modern_Cpp-2018-Nesteruk.pdf
Clean_Cpp-2017-Roth.pdf
Effective Modern C++ - Effective_Modern_Cpp-2015-Scott_Meyers.pdf
C++ Concurrency in Action - Cpp_concurrency_in_action-Practical_Multithreading-2012-Anhtony_Williams.pdf
Cpp_Multithreading_Cookbook-2014-Ljumovic.pdf
Startpage.com - The world's most private search engine
013217197X.pdf - Software_Build_Systems-Principles_and_Experience-Smith-2011.pdf
Re-Engineering Legacy Software - Re-Engineering_Legacy_Software-2016.pdf
High Integrity C++ Version 4.0 - High_Integrity_Cpp-coding_std_v.4.0.pdf

Maths - Computational Complexity - Algorithm Analysis

Concrete Mathematics - Concrete_Mathematics-A_Foundation_of_Computer_Science-1989-2ndEd-Graham_Knuth_Patashnik.pdf
cheat.dvi - math_cheats.pdf
Startpage.com - The world's most private search engine
Computational_Complexity-A_modern_approach.pdf
Think Complexity-2012.pdf
Universal Algebra and Computational Complexity Lecture 2 - Universal_Algebra_and_Computational_Complexity_PrWillard.pdf
CUUS154-FM.dvi - Edmonds_FullProofs.pdf
Invariants_definitions.pdf
LeinoLogozzo-paper120.dvi - loop_invariant_on_demand.pdf
Loop_invariants_induction_recursion.PDF
Loop_Invariants_Proofs.pdf


Operating Systems - Kernel/Drivers Development

Linux_Device_Drivers.pdf
Linux_device_driver_tutorial.pdf
Linux_Kernel_Development-3rdEd-2010-Love.pdf
Understanding_the_Linux_kernel-3rdEd-2005-Bovet.pdf
Professional_Linux_Kernel_Architecture.pdf
The_Linux_Kernel_Module_Programming_Guide-4.15.2.pdf
linux-kernel-slides.pdf

Networking Fundamentals -Theory

Computer_Networks-5thEd-2011-Tanenbaum.pdf
computer_network_5th_solutions.pdf
Startpage.com - The world's most private search engine
TCPIP.pdf
The_TCPIP_Guide-2005.pdf
TCPIP_Architecture_Design_and_Implementation_in_Linux-2008.pdf
TCPIP_Illustrated-Volume_1-2ndEdition.pdf
Understanding_TCPIP.pdf
Packet_Guide_to_Routing_and_Switching.pdf
Startpage.com - The world's most private search engine
Distributed_Networks-Intelligence_Security_and_Applications-2014.pdf
Distributed_Systems_Principles_and_Paradigms.pdf
Startpage.com - The world's most private search engine
Fundamentals_of_Cellular_Network_Planning_and_Optimisation.pdf
Rolling_Out_5G.pdf
Software_Networks-Virtualization_SDN_5G_Security.pdf
Mobile_Radio_Networks-2ndEdition.pdf
Mobile_Communication_Systems.pdf
Home_Networking_For_Dummies-4thEdition.pdf
Networking_All-in-One_For_Dummies-6thEdition.pdf
Signaling_System_7-6thEd.pdf
Mobile_Radio_Networks-2ndEdition.pdf
Startpage.com - The world's most private search engine
Beginning_NFC-2014.pdf
RFID_Handbook_3rdEdition-2010.pdf
Startpage.com - The world's most private search engine
Foundations_of_Python_Network_Programming-3rdEdition-2014.pdf
Python_Network_Programming_Cookbook-2014.pdf

IoT - Robotics - Artificial Intelligence

Building_Embedded_Systems.pdf
Designing_the_Internet_of_Things-2014.pdf
Memory_Allocation_Problems_in_Embedded_Systems-Optimization_Method.pdf
Embedded_Firmware_Solutions.pdf
Embedded_Systems_Architecture_for_Agile_Development.pdf
Making_Embedded_Systems.pdf
Mastering_Embedded_Linux_Programming.pdf
Startpage.com - The world's most private search engine
Computer_System_Design_System-on-Chip.pdf
Micro_Nanosystems_and_Systems-on-Chips.pdf
Smart_Card_Handbook-4thEdition.pdf
Startpage.com - The world's most private search engine
Real-Time_Cpp-2ndEd-2015.pdf
Electronics_Cookbook-2017.pdf
Learning_Computer_Architecture_with_Raspberry_Pi-2016-Eben_Upton.pdf
RaspberryPi_for_Secret_Agents.pdf
Arduino_for_Secret_Agents.pdf

Startpage.com - The world's most private search engine
Artificial_Intelligence_A_Modern_Approach-3rdEd-2010-Russel-Norvig.pdf
Intelligent_Systems-A_Modern_Approach.pdf
Theoretical_Foundations_of_Artificial_General_Intelligence.pdf
The_Master_Algorithm.pdf
Emotion-Oriented_Systems.pdf
Social_Machines.pdf
Startpage.com - The world's most private search engine
Neural_Networks_for_Electronics_Hobbyists.pdf
Neural_Networks_and_Computing.pdf
Advances_in_Neural_Networks_Computational_and_Theoretical_Issues.pdf
Complex-Valued_Neural_Networks_Advances_and_Applications.pdf
Machine_Learning_For_Dummies.pdf
Agile_Machine_Learning.pdf
Machine_Learning_Systems.pdf
Designing_Machine_Learning_Systems_with_Python.pdf
How_to_spot_a_machine_learning_opportunity.pdf
Fundamentals_of_Deep_Learning.pdf
Deep_Learning.pdf
Startpage.com - The world's most private search engine
Learning_Robotics_using_Python-2015.pdf
Beginning_Artificial_Intelligence_with_the_RaspberryPi-2016.pdf
Raspberry_Pi_Robotic_Blueprints.pdf
Arduino_Robotic_Projects-2014.pdf
Startpage.com - The world's most private search engine
Designing_Bots-2017.pdf
Beginning_AI_Bot_Frameworks.pdf
The_Intelligent_Web.pdf
Neural%20Networks%20for%20Electronics%20Hobbyists.pdf

Cryptocurrency - Blockchain

Bitcoin-A_Peer-to-Peer_Electronic_Cash_System-2009-Satoshi_Nakamoto.pdf
Startpage.com - The world's most private search engine
Bitcoin_Essentials-2016-Smigielski.pdf
Learning_Bitcoin.pdf
Beginning_Blockchain-2018-Singhal_Dhameja_Panda.pdf
Startpage.com - The world's most private search engine
Decentralized_Applications-Harness_Blockchain_Tech-2016-Raval.pdf
The_Blockchain_Developer.pdf
Mastering_Bitcoin-Programming_The_Open_Blockchain-2ndEd-2017-Antonopoulos.pdf

Quantum Computing

Quantum_Computing_since_Democritus-Aaronson-2013.pdf
The_Secret_Life_of_Programs-Steinhart-2019.pdf
1.Intro_to_quantum_computing_for_non-physicits-Rieffel_pollack.pdf
2.quantum_tutorial.pdf
3.qc_for_beginners.pdf
4.IntroductionQuantumCircuits.pdf
5.Algorithmique_quantique.pdf
6.Algo_Quant.pdf
7.mcharemza_quant_comp.pdf
8.Ordinateurs_quantiques_reves_realites-Raimond.pdf
Intro_Quantum_Algos_Shor.pdf
Les%20%20algorithmes%20quantiques.pdf
quantum.pdf
SizemoreTalk.pdf

Sessions

CODING CHALLENGES

firstDuplicate | CodeSignal
Coding Tests and Assessments for Technical Hiring | CodeSignal
Dashboard | HackerRank
Programming Online Training In Coding Skills | Codility - Codility
Request a Demo | Remote Online Code Testing | Codility
CodinGame for Work - Create new account and start sourcing
Burst Balloons - LeetCode
LintCode
Achieve mastery through challenge | Codewars
InterviewBit: Coding Interview Questions
GeeksforGeeks | A computer science portal for geeks
Warning: Potential Security Risk Ahead
Timus Online Judge
Codeforces
Startpage.com - The world's most private search engine
GitHub - RodneyShag/HackerRank_solutions: 317 efficient solutions to HackerRank problems
GitHub - gzc/CLRS: Solutions to Introduction to Algorithms
algorithms - Is there a difference between top-down and bottom-up dynamic programming? - Computer Science Stack Exchange
Tabulation vs Memoization - GeeksforGeeks
Dynamic Programming vs Divide-and-Conquer - GeeksforGeeks

CONFIG - SMART HOME - TV

How to Install Android on a Raspberry Pi
device_brcm_rpi3/start.elf at nougat-tablet · android-rpi/device_brcm_rpi3 · GitHub
How to Manually Install or Sideload Apps on Android
Android Pie on RPi 3B(+) with hardware acceleration - Raspberry Pi Forums
How to Install Android TV in Raspberry Pi 3 - Make Tech Easier
How to finally Install Android on your Raspberry Pi? [Complete Guide] – Raspberry tips
How to Make a Raspberry Pi Android TV Box
7 Amazing Android TV Tricks You Definitely Didn’t Know About
8 Great Browsers You Can Run on Your Raspberry Pi 3
What's the Best Browser for Android TV? 5 Top Apps, Ranked
[HowTo!] Smooth youtube 1080p in Chromium - Raspberry Pi Forums
Startpage.com - The world's most private search engine
How to Choose and Optimise Your Raspberry Pi Browser
The 5 Best Raspberry Pi Smart TV Projects We've Seen
How to Make Your Own DIY Chromecast With a Raspberry Pi
How to use your Raspberry Pi as a Chromecast alternative - The Pi
Raspberry Pi Media Center: How to Install Kodi on Raspbian
Raspberry Pi - Official Kodi Wiki
A simple change may vastly improve your Raspberry Pi Kodi performance
LibreELEC, OpenELEC or OSMC - What's The Best OS for Me?

CONFIG C/C++ EMACS IDE

C/C++ Development Environment for Emacs
Emacs Mini Manual (PART 3) - CUSTOMIZING AND EXTENDING EMACS
GitHub - leoliu/ggtags: Emacs frontend to GNU Global source code tagging system.
EmacsWiki: Cc Mode
GitHub - tuhdo/emacs-c-ide-demo: Emacs setup for C/C++ with Helm describe here: http://tuhdo.github.io/c-ide.html

CONFIG PYTHON EMACS IDE

EmacsWiki: Python Programming In Emacs
Jedi.el - Python auto-completion for Emacs — Emacs Jedi 0.2.0alpha2 documentation
Emacs: The Best Python Editor? – Real Python
YouTube

CONFIG SYSADMIN - HOME LAB

ESXi Free vs Paid - What are the differences? | ESX Virtualization
The Top 5 Enterprise Type 1 Hypervisors You Must Know
Which is better for virtualization - VMware or VirtualBox? - Quora
Hack Like a Pro: How to Create a Virtual Hacking Lab « Null Byte :: WonderHowTo
How to Use SecGen to Generate a Random Vulnerable Machine « Null Byte :: WonderHowTo
Chapter 6. Virtual Networking
How to Attack a Vulnerable Practice Computer: A Guide from Scan to Shell « Null Byte :: WonderHowTo
access virtualbox vm from lan at DuckDuckGo
virtualbox - How to allow other computers on the network to access my virtual web server? - Super User
networking - Network access to VirtualBox VM from Network PCs - Super User
How to access a VirtualBox VM guest through the internet remotely | Tom's Hardware Forum
How do I install Guest Additions in a VirtualBox VM? - Ask Ubuntu
VirtualBox Guest Additions Installation In Ubuntu, Linux Mint, Debian, Fedora And openSUSE [How-To] - Linux Uprising Blog
VirtualBox - ArchWiki
VirtualBox Network Settings: All You Need to Know
Puppy Linux - Wikipedia
Puppy Linux Installation and Usage
HOWTO: Create a bootable Linux Media using the dd Command - Toolbox
Startpage.com - The world's most private search engine
virtualbox.org • View topic - Virtual USB memory stick drive
How to add a "virtual" USB storage online to a running VirtualBox guest? - Super User
How to Mount USB Drives on VirtualBox - DZone Integration
Master boot record - Wikipedia
Extended boot record - Wikipedia
GUID Partition Table - Wikipedia
Amiga rigid disk block - Wikipedia
Disk partitioning - Wikipedia
System partition and boot partition - Wikipedia
Booting - Wikipedia
Partition - Debian Wiki
Partitioning - ArchWiki
Swap - ArchWiki
Partitioning - ArchWiki
Arch boot process - ArchWiki
Preparing the disks - Gentoo Wiki
Primary Partition VS. Logical Drive: Their Exact Features
What is the difference between Primary and logical partition? - Quora
hard drive - What are the differences between primary and logical partition? - Super User
An Easy Way to Set Partition as Active or Inactive with MiniTool
Primary vs Logical partition - Unix & Linux Stack Exchange
What is the Difference Between Primary/Extended Partition and Logical Drive?
Ubuntu installation partitioning: Logical or primary? - Ask Ubuntu
Primary Partition, Logical Partition and Extended Partition (Disk Partition Basic)
What is a Partition?
What is a Logical Partition?
hard drive - Which is better for keeping data: primary partition or logical partition? - Super User
What is Boot?
What is a Bootable Disk?

CONFIGS SYSADMIN

opensource.com/life/16/11/running-commands-shutdown-linux
SysVinit - ArchWiki
shutdown - How to run a command before the machine automatically shuts down? - Ask Ubuntu
run levels in linux at DuckDuckGo
Linux Changing Run Levels - nixCraft
Debian and Ubuntu Linux Run Levels | Debian Admin
Run levels
Runlevel - Wikipedia
How To Use Systemctl to Manage Systemd Services and Units | DigitalOcean
linux date formatting for use in script at DuckDuckGo
How To Format Date For Display or Use In a Shell Script - nixCraft
Allow non-admin users to mount drives via nautilus - Ask Ubuntu
authentication - Stop Ubuntu asking for password to mount second drive - Ask Ubuntu
debian - Make Nautilus mount USB so unprivileged user can write to it - Super User
linux - Prevent gnome from automatically mounting partition when clicked in nautilus - Super User
partitioning - Why am I asked for my password when I want to mount a drive - Ask Ubuntu
Prograstinator: Nutch + Solr for a local filesystem search engine
lucidworks.com/2009/03/09/nutch-solr/
IntranetDocumentSearch - NUTCH - Apache Software Foundation
Scraping the Web with Nutch for Elasticsearch
Apache Nutch - Wikipedia
Apache Solr - Wikipedia
Open Semantic Search: Your own search engine for documents, images, tables, files, intranet & news
What is the difference between web crawler and search engine? - Quora
Data Scraping vs. Data Crawling | Promptcloud
What are the biggest differences between web crawling and web scraping? - Quora

CONFIGS SYSADMIN - MIGRATION

Startpage.com - The world's most private search engine
DIY: Build a Custom Minimal Linux Distribution from Source | Linux Journal
Migrate Your Linux Installation Between Machines
New Computer, Old OS: How To Migrate Linux Between Machines
Migrate installation to new hardware - ArchWiki
drivers - Moving linux install to a new computer - Unix & Linux Stack Exchange
backup - How to migrate the whole system to a new machine? - Ask Ubuntu
How To Migrate Linux Servers Part 1 - System Preparation | DigitalOcean

CRYPTOCURRENCIES & BLOCKCHAINS

bitcoin.pdf
Bitcoin Wiki
Bitcoin and cryptocurrency algorithms and implementation tutorial. | Toptal
Satoshi Nakamoto - Wikipedia
Startpage.com - The world's most private search engine
List of cryptocurrencies - Wikipedia
The Bitcoin Lightning Network Explained | Toptal
Ethereum vs Bitcoin: What are the Differences & Which is Better?
Cryptocurrency exchange - Wikipedia
How to Build a Cryptocurrency Exchange App | by Pratik Rupareliya | The Startup | Medium
1 new message
How to set up your own cryptocurrency exchange - Quora
how to buy bitcoin without using an exchange at DuckDuckGo
5 Ways to Buy Bitcoin Without Verification or ID Anonymously
marketplace - Where Can i Buy Bitcoins without using exchange? - Bitcoin Stack Exchange
YouTube
ImponderableThings (Scott Driscoll's Blog): The Essence of How Bitcoin Works (Non-technical)
ImponderableThings (Scott Driscoll's Blog): How Bitcoin Works Under the Hood
How the Bitcoin protocol actually works | DDI
Blockchain - Wikipedia
Distributed ledger - Wikipedia
What Does Cryptocurrency Have to Do With Blockchain Anyway?
TR_EB_blockchain_final2.pdf
How to Build Your Own Blockchain Part 1 — Creating, Storing, Syncing, Displaying, Mining, and Proving Work | Big-Ish Data
How blockchain will reduce the cost of running an open organization | Opensource.com
Don't Use a Blockchain Unless You Really Need One - CoinDesk
Decentralization is blockchain's USP
blockchain vs database at DuckDuckGo
ledger vs blockchain at DuckDuckGo
Majority attack - Bitcoin Wiki
Flood attack - Bitcoin Wiki
Storing bitcoins - Bitcoin Wiki
Double-spending - Wikipedia
Proof of work - Wikipedia
explanation of satoshi nakamoto paper at DuckDuckGo
The Bitcoin White Paper Explained
Bitcoin White Paper for normal people! | by Wan Raitelli | Medium
Server Not Found
Satoshi Nakamoto’s Bitcoin Whitepaper: A thorough and straightforward walk-through
The Bitcoin White Paper Explained, What you NEED to Know!

DEV PROJECTS

9. Classes | Perforce
CppCoreGuidelines/CppCoreGuidelines.md at master · isocpp/CppCoreGuidelines · GitHub
Summary of 'Clean code' by Robert C. Martin · GitHub
Server Not Found
Standard C++
stroustrup.com/bs_faq2.html
hardcodet.net » An Introduction to SLF, the Simple Logging Façade
Logging In C++: Part 2 | Dr Dobb's
A Lightweight Logger for C++ | Dr Dobb's
GitHub - PlatformLab/NanoLog: Nanolog is an extremely performant nanosecond scale logging system for C++ that exposes a simple printf-like API.
Which design pattern would you consider when Logging is needed? - Stack Overflow
c++ - How do I implement convenient logging without a Singleton? - Stack Overflow
design patterns - Why we should consider the «Logger» class as a singleton? - Stack Overflow
CS635: Doc 6, Logging: A Use of Singleton
Copy assignment operator - cppreference.com
c++ - What is the copy-and-swap idiom? - Stack Overflow
c++ - What is The Rule of Three? - Stack Overflow
Using Hamcrest for testing - Tutorial
GitHub - jlangr/c2: Chapter First Example
GitHub - google/googletest: Googletest - Google Testing and Mocking Framework
googletest/googletest at master · google/googletest · GitHub
googletest/primer.md at master · google/googletest · GitHub
googletest/README.md at master · google/googletest · GitHub
Google Test and Google Mock. Google Test and Google Mock are popular… | by Phil Wright | FoxGuard Development | Medium
Introduction to Google Mock
cmake-buildsystem(7) — CMake 3.15.7 Documentation
FAQ · Wiki · CMake / Community · GitLab
GoogleTest · Modern CMake
CMake Tutorial. I have read numerous documentations and… | by Onur Dündar | Medium
CMake-Cheatsheet/CMake_Cheatsheet.pdf at master · mortennobel/CMake-Cheatsheet · GitHub
CMake Cheat Sheet | OverAPI.com
CMake - Cross Platform Make
CMake stuff i wish i knew earlier
Cmake cheat sheet
Hello CMake! - Simplify C++!
Cpputest
GitHub - cpputest/cpputest: CppUTest unit testing and mocking framework for C/C++
c++ - GoogleTest vs CppUnit: The facts - Stack Overflow
Test-driven development and unit testing with examples in C++
c++ - Adding multiple executables in CMake - Stack Overflow
building multiple targets in cmake at DuckDuckGo
How can I build multiple targets using cmake --build - Stack Overflow
Startpage.com - The world's most private search engine
c++ - Does set_target_properties in CMake override CMAKE_CXX_FLAGS? - Stack Overflow
cmake - Changing CMAKE_CXX_FLAGS in project - Stack Overflow
[CMake] Different CMAKE_CXX_FLAGS for different executables
[CMake] Replacing compiler flags for certain project subdirectories
visual studio 2008 - CMake: defining link directories and libraries for different build targets - Stack Overflow
Page not found - Stack Overflow
target_compile_options — CMake 3.18.1 Documentation
target_include_directories — CMake 3.18.1 Documentation
target_link_libraries — CMake 3.0.2 Documentation
What is the modern method for setting general compile flags in CMake? - Stack Overflow
c++ - How do I add a linker or compile flag in a CMake file? - Stack Overflow
c++ - Debug vs Release in CMake - Stack Overflow
cmake-generator-expressions(7) — CMake 3.3.2 Documentation
Running CMake · Modern CMake
target_link_directories — CMake 3.18.20200807-g2f97d5a Documentation
Some notes on CMake variables and scopes — Matthew Gaudet

ENTREPRENEUR STUFFS

Gmail : la messagerie de Google
MyProcurement : Lutte contre le travail dissimulé : Accueil
Google Drive : connexion
Hiscox Direct
comparateur assurance rcp at DuckDuckGo
Devis responsabilité civile professionnelle | LeLynx.fr
comprendre les franchises d'assurance rcp - Google Search
Numéro de TVA intracommunautaire - professionnels | service-public.fr
Modèle : Demande d'attribution d'un numéro de TVA intracommunautaire à un assujetti non redevable | service-public.fr
Upwork Help
Value Added Tax (VAT) – Upwork Help
VAT identification number - Wikipedia
Professionnel | authentification
La déclaration des auto-entrepreneurs - Erreur
microentrepreneur comment payer ses impots sur gouv impot - Google Search
Déclaration impôt auto-entrepreneur 2018
Micro-entrepreneurs : comment déclarer vos revenus ? | economie.gouv.fr
Comment déclarer les revenus provenant de mon activité de micro-entrepreneur ? | impots.gouv.fr

HARDWARE PURCHASE

is a gaming laptop suitable for hacking at DuckDuckGo
How to Hack Wi-Fi: Choosing a Wireless Adapter for Hacking « Null Byte :: WonderHowTo
compatible_cards [Aircrack-ng]
faq [Aircrack-ng]
How to Select a Field-Tested Kali Linux Compatible Wireless Adapter « Null Byte :: WonderHowTo
Buy the Best Wireless Network Adapter for Wi-Fi Hacking in 2019 « Null Byte :: WonderHowTo
Home
Asus TUF Gaming laptops blend AMD Ryzen CPUs with Nvidia 16 Series graphics | Trusted Reviews
The best CPU for gaming | PC Gamer
ROG Strix GL702ZC | ROG - Republic Of Gamers | ASUS USA
Top 10 Best Laptop for Hacking in 2020 - Sysprobs
Buying a professional penetration testing laptop for 2017 | by Andrew Douma | Medium
Product Review: Best Hacking Laptops for 2017 - YouTube
Minimum Requirements of a Laptop to Be Used for Hacking « Null Byte :: WonderHowTo
How to Stay Anonymous While RATting (Level: Paranoid) « Null Byte :: WonderHowTo
What are the best laptops for hacking? - Quora
Razer Gaming Laptops and Ultrabook - Blade, Blade Stealth, and Blade Pro | Razer Europe
GPU-Based Cracking: AMD Vs. Nvidia In Brute-Force Attack Performance - Wi-Fi Security: Cracking WPA With CPUs, GPUs, And The Cloud | Tom's Hardware
how to buy security oriented laptop at DuckDuckGo
best hacking laptop 2019 at DuckDuckGo
Which are The Most Secure Laptops (Notebooks) in 2017
This is the most secure computer you’ll ever own | The Verge
Beautiful, Secure, Privacy-Respecting Laptops & Phones – Purism
Where would you buy a secure laptop? - Quora
Best Laptops For Hacking in 2020: laptops for cyber security | Compsmag
Best Laptops for Hacking 2020 (Ultimate Buyer's Guide)
MSI Global English Forum - Index
Which laptop configuration should I buy to learn ethical hacking? - Quora
GeForce GTX 1080 vs GeForce GTX 1660 Ti – Hardware Compare: Graphics Cards, CPU & SSD Comparison
gtx 1080 vs 1660 ti at DuckDuckGo
Ryzen 5 2600 vs. Ryzen 7 2700, 6 or 8-cores for Gaming? : Amd
Ryzen 7 vs Ryzen 5 for Gaming and Other | Tom's Hardware Forum
How Much Video Memory (VRAM) Do you need for Gaming in 2020?
4GB, 8GB Or 16GB: How Much RAM Do You Need?
best ram amount for gaming at DuckDuckGo
ideal ram for gaming at DuckDuckGo

INTERVIEW CODING-ALGORITHMICS PREP

Programming - InterviewBit
LeetCode - The World's Leading Online Programming Learning Platform
LintCode 领扣
HackerRank
Coding Tests and Assessments for Technical Hiring | CodeSignal
Coding Games and Programming Challenges to Code Better
codeforces.com/
1. Iterations lesson - Learn to Code - Codility
GeeksforGeeks | A computer science portal for geeks
Programming Problems grouped by Company & Topic Tags | Practice | GeeksforGeeks
Startpage.com - The world's most private search engine
glassdoor.co.in/Interview/You-will-be-supplied-with-two-data-files-in-CSV-format-The-first-file-contains-statistics-about-various-dinosaurs-The-se-QTN_2088069.htm
I just got a developer job at Facebook. Here’s how I prepped for my interviews.
Top 10 Algorithms for Coding Interview
Top 10 algorithms in Interview Questions - GeeksforGeeks
hackernoon.com/top-20-searching-and-sorting-algorithms-interview-questions-5a476121fd0f
The 30-minute guide to rocking your next coding interview
How To Approach Any Algorithm Interview Without Panicking
Choosing a Programming Language for Interviews & Jobs
Preparing for your Software Engineering Interview at Facebook | Facebook Careers
Standard C++
Super-FAQ : Standard C++
Modern C++ for C programmers -- bert hubert : Standard C++
CppCoreGuidelines/CppCoreGuidelines.md at master · isocpp/CppCoreGuidelines · GitHub
List of data structures - Wikipedia
Abstract data type - Wikipedia

INTERVIEW CRYPTOGRAPHY / PRIVACY / ANONYMITY PREP

github.com/AnarchoTechNYC/meta/wiki/InfoSec
github.com/onlurking/awesome-infosec/blob/master/readme.md
github.com/fffaraz/awesome-cpp#cryptography
en.wikipedia.org/wiki/Outline_of_cryptography
seedsecuritylabs.org/Labs_16.04/Crypto/
seedsecuritylabs.org/Labs_16.04/Crypto/Crypto_MD5_Collision/
PDF.js viewer
startpage.com/
crypto.stackexchange.com/questions/66162/if-kerckhoffs-principle-holds-why-do-we-need-a-cipher-at-all
en.wikipedia.org/wiki/Cryptographic_primitive
en.wikipedia.org/wiki/Cryptographic_protocol
crypto.stackexchange.com/questions/39735/whats-a-cryptographic-primitive-really
en.wikipedia.org/wiki/Information-theoretic_security
What is perfect secrecy? - Cryptography Stack Exchange
crypto.stackexchange.com/questions/3896/simply-put-what-does-perfect-secrecy-mean
en.wikipedia.org/wiki/Semantic_security
en.wikipedia.org/wiki/Ciphertext_indistinguishability
crypto.stackexchange.com/questions/20916/how-can-a-cryptosystem-be-unconditionally-secure
crypto.stackexchange.com/questions/67194/whats-the-difference-between-perfect-security-and-unconditional-security
crypto.stackexchange.com/questions/70453/what-is-the-relation-between-computational-security-and-provable-security
PDF.js viewer
en.wikipedia.org/wiki/Provable_security
crypto.stackexchange.com/questions/63478/what-conditions-does-a-provable-secure-cryptosystem-satisfy
crypto.stackexchange.com/questions/10918/how-to-prove-the-security-of-the-prng
en.wikipedia.org/wiki/Forward_secrecy
en.wikipedia.org/wiki/Forward_anonymity
en.wikipedia.org/wiki/One-time_pad
en.wikipedia.org/wiki/List_of_cryptographers
en.wikipedia.org/wiki/Cryptography
en.wikipedia.org/wiki/Cryptovirology
math.stackexchange.com/questions/35381/is-every-encryption-a-bijective-function
duckduckgo.com/?q=homomorphic+encryption+wiki&t=ffab&ia=web
en.wikipedia.org/wiki/Homomorphic_encryption
crypto.stackexchange.com/questions/292/how-does-asymmetric-encryption-work
crypto.stackexchange.com/questions/71836/can-a-public-key-be-same-as-private-key
implementation - In RSA, how does the CPU deal with this huge modulus (8192 bits)? - Cryptography Stack Exchange
crypto.stackexchange.com/questions/15382/hmac-sha1-vs-hmac-sha256
crypto.stackexchange.com/questions/5646/what-are-the-differences-between-a-digital-signature-a-mac-and-a-hash
crypto.stackexchange.com/questions/40757/key-derivation-functions-kdf-what-are-main-purposes-how-can-they-be-used
paragonie.com/blog/2015/09/how-to-safely-implement-cryptography-in-any-application
crypto.stackexchange.com/questions/54082/in-end-to-end-encryption-doesnt-the-server-need-to-be-trusted
crypto.stackexchange.com/questions/68648/about-integer-factorization
crypto.stackexchange.com/questions/10590/what-makes-rsa-secure-by-using-prime-numbers
en.wikipedia.org/wiki/Public-key_cryptography
crypto.stackexchange.com/questions/2884/rsa-proof-of-correctness
cryptanalysis - How long does it take to crack RSA 1024 with a PC? - Cryptography Stack Exchange
en.wikipedia.org/wiki/Cryptographic_hash_function
en.wikipedia.org/wiki/Hash_function
crypto.stackexchange.com/questions/63339/how-do-hashes-really-ensure-uniqueness
crypto.stackexchange.com/questions/70877/is-a-hash-a-zero-knowledge-proof
crypto.stackexchange.com/questions/2936/hmac-vs-mac-functions
crypto.stackexchange.com/questions/26336/sha512-faster-than-sha256
crypto.stackexchange.com/questions/20997/second-pre-image-resistance-vs-collision-resistance
crypto.stackexchange.com/questions/29601/perfect-hash-function
crypto.stackexchange.com/questions/3216/signatures-rsa-compared-to-ecdsa
crypto.stackexchange.com/questions/5458/should-we-sign-then-encrypt-or-encrypt-then-sign
crypto.stackexchange.com/questions/71029/are-dsa-and-ecdsa-provably-secure-assuming-dl-security
crypto.stackexchange.com/questions/20/what-are-the-practical-differences-between-256-bit-192-bit-and-128-bit-aes-enc
crypto.stackexchange.com/questions/46559/what-are-the-chances-that-aes-256-encryption-is-cracked
crypto.stackexchange.com/questions/68163/why-does-the-signal-protocol-use-aes-cbc-instead-of-aes-gcm
crypto.stackexchange.com/questions/34929/to-what-extent-is-whatsapps-statement-on-secure-messaging-realistic
crypto.stackexchange.com/questions/58443/if-whatsapp-cannot-read-our-message-how-can-the-media-forwarding-happen-in-an-i
crypto.stackexchange.com/questions/9926/what-is-the-shared-secret-used-for-in-ipsec-vpn
crypto.stackexchange.com/questions/8933/how-can-i-use-ssl-tls-with-perfect-forward-secrecy
en.wikipedia.org/wiki/Cryptanalysis
security.stackexchange.com/questions/61687/crack-unknown-encryption
crypto.stackexchange.com/questions/6752/how-would-one-crack-a-weak-but-unknown-encryption-protocol
crypto.stackexchange.com/questions/3826/possible-ways-to-crack-simple-hand-ciphers
en.wikipedia.org/wiki/Quantum_cryptography
en.wikipedia.org/wiki/Post-quantum_cryptography
quantumcomputing.stackexchange.com/questions/2343/is-quantum-cryptography-safer-than-classical-cryptography
crypto.stackexchange.com/questions/68971/can-shors-algorithm-factor-multi-prime-numbers

INTERVIEW SOFTWARE SYSTEM DESIGN TECHNICAL PREP

Page introuvable
GitHub - checkcheckzz/system-design-interview: System design interview for IT companies
System Design - InterviewBit
5 traits of good systems architecture | Opensource.com
Top 10 System Design Interview Questions for Software Engineers | Hacker Noon
Crack the System Design interview: tips from a Twitter software engineer
Top 27 Expert System Freelancers for Hire In August 2020 - Upwork
What system design, distributed systems, and scalability topics should I study, in order to be adequately prepared for a Google software engineer interview? - Quora
System Design Cheatsheet · GitHub
15+ Ultimate Software Architecture Interview Questions (ANSWERED) | FullStack.Café
What are some dead giveaways that someone is a 10X software engineer/developer just by looking at their code? - Quora
7 Ways to Get Better at C++ During this Summer - Fluent C++
✅ Every time you build a to-do list app, a puppy ? dies ?
Startpage.com - The world's most private search engine
Stripe API Reference
API libraries
Documentation
build statistics dashboard web app at DuckDuckGo
build statistics dashboard web app stripe at DuckDuckGo
Build a realtime payment dashboard with Stripe
How to Integrate Stripe Payments in Web Application? | Hacker Noon
Create a Python powered dashboard in under 10 minutes
Dash Documentation & User Guide | Plotly
Building a Serverless Stripe Analytics Dashboard | Cube.js Blog
how to build a rss feed reader at DuckDuckGo
How APIs work — An Analogy For Dummies | by Timothy Choi | Medium
Representational state transfer - Wikipedia
http - What exactly is RESTful programming? - Stack Overflow
What happens when you type a URL in the browser and press enter? | by Maneesha Wijesinghe | Medium
RFC 7231 - Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content
RFC 7540 - Hypertext Transfer Protocol Version 2 (HTTP/2)
HTTP/2: the difference between HTTP/1.1, benefits and how to use it | by Factory.hr | Medium
HTTP/1.1 vs HTTP/2: What's the Difference? | DigitalOcean
tcp - What is the difference between HTTP 1.1 and HTTP 2.0? - Stack Overflow
HTTP/2 - Wikipedia
What Happens When You Type a Url in Your Browser and Press Enter - DEV
libcurl internals - Everything curl
Laravel API Tutorial: Building & Testing a RESTful API | Toptal
RESTful API Security - DZone Integration
What is REST?
Can anyone refer a penetration & security testing tool for RESTful API? - Quora
Bill Sempf | Cracking and Fixing REST APIs
RESTful API Best Practices and Common Pitfalls | by Spencer Schneidenbach | Medium
Top 5 REST API Security Guidelines
ruby for client side web at DuckDuckGo
Ruby: client-side or server-side? - Stack Overflow
A mobile, desktop and website App with the same code | by Benoit VALLON | Medium
python vs ruby web development at DuckDuckGo
Python vs. Ruby: Which is best for web development? | Opensource.com
Python Vs. Ruby: Which Is Better For Web Development? | by Amit Ashwini | The Startup | Medium
python vs ruby resful api at DuckDuckGo
Django (web framework) - Wikipedia
Web framework - Wikipedia
What is the best JavaScript framework to use to build a web app? - Quora
`Top 3 Best JavaScript Frameworks for 2019 | by Cuelogic Technologies | Cuelogic Technologies | Medium
jQuery vs React vs Vue.js | What are the differences?
Vue.js vs jQuery: Use Cases and Comparison with Examples ― Scotch.io
jQuery - Wikipedia
Which is the best javascript framework for beginners? - Hashnode
Which JavaScript Framework Should You Learn First? - Skillcrush
JS Frameworks: A brief overview. Before coming to the list of frameworks… | by Prashant kumar | Beginner's Guide to Mobile Web Development | Medium
The Noob’s Guide to Choosing a JavaScript Framework
Which is the best Javascript Framework for beginners? - Quora
What is the best frontend framework for beginners ? : javascript
You SHOULD Learn Vanilla JavaScript Before JS Frameworks - Snipcart
You shouldn't focus on learning JavaScript frameworks - DEV
Top 10 List of JavaScript Libraries and Frameworks to Learn in 2020
Which one is better node vs angular vs react? - Quora
AngularJS vs Nodejs vs ReactJS: Which One Would You Choose?
ECMAScript - Wikipedia
TypeScript - Wikipedia

INTERVIEW APP SECURITY PREP

awesome-infosec/readme.md at master · onlurking/awesome-infosec · GitHub
InfoSec · AnarchoTechNYC/meta Wiki · GitHub
GitHub - infoslack/awesome-web-hacking: A list of web application security
GitHub - devsecops/awesome-devsecops: An authoritative list of awesome devsecops tools with the help from community experiments and contributions.
GitHub - secfigo/Awesome-Fuzzing: A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.
Application security - Wikipedia
Application Security Wiki
resources.infosecinstitute.com/category/application-security-2/
cheatsheetseries.owasp.org/cheatsheets/Threat_Modeling_Cheat_Sheet.html
Download Microsoft Threat Modeling Tool 2016 from Official Microsoft Download Center
cheatsheetseries.owasp.org/cheatsheets/Attack_Surface_Analysis_Cheat_Sheet.html
Threat model | Surveillance Self-Defense
02_what_is_security.pdf
cheatsheetseries.owasp.org/
Code injection - Wikipedia
SQL injection - Wikipedia
What happens when you type a URL in the browser and press enter? | by Maneesha Wijesinghe | Medium
seedsecuritylabs.org/Labs_16.04/Web/
seedsecuritylabs.org/Labs_16.04/Web/Web_SQL_Injection/
SQL_Injection.pdf
Chapter 6. Virtual Networking
youtube.com/watch?v=_P8HCLkDInA&feature=youtu.be
cis.syr.edu/~wedu/education/websec3.html
cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html
Web application firewall - Wikipedia
Complete Web Application Firewall Guide | by rezaduty | devconnected — DevOps, Sysadmins & Engineering | Medium
How do I test for SQL injection vulnerabilities on a site with input fields? - Information Security Stack Exchange
sql injection - Is it possible to detect 100% of SQLi with a simple regex? - Information Security Stack Exchange
web application - SQL injection is 17 years old. Why is it still around? - Information Security Stack Exchange
How can I explain SQL injection without technical jargon? - Information Security Stack Exchange
penetration test - Is single quote filtering nonsense? - Information Security Stack Exchange
cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html
IntroSecureCoding
How are Stripe merchants able to avoid PCI compliance requirements even though they capture the card details on their own checkout page? - Quora
How is the Stripe payment method PCI compliant? - Quora
A guide to PCI compliance
GitHub - gurugio/lowlevelprogramming-university: How to be low-level programmer
GitHub - tylerha97/awesome-reversing: A curated list of awesome reversing resources
Mobile security - Wikipedia
GitHub - ashishb/android-security-awesome: A collection of android security related resources
root access - What is the difference between: Rooting, Jailbreak, ROM, Mod, etc.? - Android Enthusiasts Stack Exchange
GitHub - OWASP/owasp-mstg: The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.
GitHub - iosre/iOSAppReverseEngineering: The world’s 1st book of very detailed iOS App reverse engineering skills :)

INTERVIEW NETWORK / SYSTEMS SECURITY TECHNICAL PREP

awesome-infosec/readme.md at master · onlurking/awesome-infosec · GitHub
InfoSec · AnarchoTechNYC/meta Wiki · GitHub
SEED Project
Run SEED VM on VirtualBox - SEEDVM_VirtualBoxManual.pdf
VirtualBox Network Settings: All You Need to Know
TCP Attacks Lab
TCP_Attacks.pdf
TCPIP.pdf
Scapy - Wikipedia
Network-security/Attacks on Layer2,3,4 Protocols at master · deepanshululla/Network-security · GitHub
Python Scapy vs dpkt - Stack Overflow
netwox examples
Netwox
Microsoft Word - course-paper-5620-attacktcpip.docx - course-paper-5620-attacktcpip.pdf
Startpage.com - The world's most private search engine
The TCP/IP Model and Protocol Suite Explained for Beginners
Packet Traveling – Practical Networking .net
Linux Capability Exploration Lab
Role-Based Access Control (RBAC) Lab
Encrypted File System Lab
Top 20 OpenSSH Server Best Security Practices - nixCraft
Linux PAM configuration that allows or deny login via the sshd server - nixCraft
Linux: 25 Iptables Netfilter Firewall Examples For New SysAdmins - nixCraft
40 Linux Server Hardening Security Tips [2019 edition] - nixCraft
Security-Enhanced Linux - Wikipedia
sudo - From a security standpoint should I add my user to the sudoers file or not? - Unix & Linux Stack Exchange
25 Hardening Security Tips for Linux Servers
Unix security - Wikipedia
Fear Not Root « IgnorantGuru's Blog
Dangerous Sudoers Entries – PART 1: Command Execution – Compass Security Blog
How to exploit SUDO via Linux Privilege Escalation
Environment Variable and Set-UID Lab
1987-sproglogin.pdf
setuid - Wikipedia
Comparison of privilege authorization features - Wikipedia
File system permissions - Wikipedia
Capabilities - ArchWiki
setuid-usenix02.pdf
Microsoft Word - setuid.txt - setuid.pdf
POS37-C. Ensure that privilege relinquishment is successful - SEI CERT C Coding Standard - Confluence
POS36-C. Observe correct revocation order while relinquishing privileges - SEI CERT C Coding Standard - Confluence
linux - Understanding UNIX permissions and file types - Unix & Linux Stack Exchange
files - Difference between owner/root and RUID/EUID - Unix & Linux Stack Exchange
How to use setuid to install a root backdoor. · GitHub
Honeypot (computing) - Wikipedia
Hack Like a Pro: How to Set Up a Honeypot & How to Avoid Them « Null Byte :: WonderHowTo
What is Honeyspot? -
Protocol spoofing - Wikipedia
Mail Server Security: Potential Vulnerabilities and Protection Methods
Active Directory Security – Active Directory & Enterprise Security, Methods to Secure Active Directory, Attack Methods & Effective Defenses, PowerShell, Tech Notes, & Geek Trivia…

INTERVIEW PREP - GENERAL RESOURCES

Stripe (company) - Wikipedia
glassdoor.fr/Entretien/Stripe-questions-entretien-d-embauche-E671932.htm?countryRedirect=true
teamblind.com/issue/13749/Stripe-Interview
Guide: How to Get a Job at Stripe - Pathrise
Cracking The Code: Why Stripe Defies A Tech-Interview Norm
Stripe: Jobs
The untold story of Stripe, the secretive $20bn startup driving Apple, Amazon and Facebook | WIRED UK
Stripe Data Science Interview Questions | by Vimarsh Karbhari | Acing AI | Medium
Stripe: Recruiting, hiring, and managing talent
What is the engineering interview process like at Stripe? - Quora
CS Career Hackers | Home
Preparing for Tech Interviews with Paul Carleton of Stripe [INTERVIEW]
resources.infosecinstitute.com/top-50-information-security-interview-questions/
How to prepare for a security engineer interview. | by Eray Mitrani | Medium
How should I prepare for a production engineer interview at Facebook? - Quora
Production Engineering Internship Interview Process @ Facebook - Shivam Khandelwal
xss mitigation at DuckDuckGo
how do browsers prevent xss at DuckDuckGo
How do web browsers detect XSS attempts when the X-XSS-Protection header is enabled? - Information Security Stack Exchange
youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/playlists
youtube.com/playlist?list=PLXKn7LtkQIZVH-UjkqnbcpfT4dxOJcuhE
Top 60 Linux Interview Questions & Answers
Top 50 Unix Interview Questions & Answers
Coding Practice - InterviewBit

IOT - ROBOTICS - AI - ELECTRONICS

GitHub - fffaraz/awesome-cpp: A curated list of awesome C++ (or C) frameworks, libraries, resources, and shiny things. Inspired by awesome-... stuff.
What is the relationship between IoT and cloud computing? - Quora
The cloud and the Internet of things are inseparable | InfoWorld
The role of cloud tech in internet of things - Knowlarity
arduino vs raspberry pi for robotics at DuckDuckGo
best platform for robotics at DuckDuckGo
Artificial Intelligence: A Modern Approach
Full Table of Contents for AI: A Modern Approach
robot rover arduino project at DuckDuckGo
18 rover Projects - Arduino Project Hub
best arduino robot project at DuckDuckGo
Spy Rover Robot Implemented Using IP Camera that Allows Long Distance Transmission
How To Build Custom Android App for your Arduino Project using MIT App Inventor - HowToMechatronics
Arduino Remote LITE - A new and simple Remote Control app for Arduino
Arduino Bot Android Remote Control : 7 Steps (with Pictures) - Instructables
Startpage.com - The world's most private search engine
How to Turn Your Android Phone into a Security Camera - Make Tech Easier
How to Detect a Hidden Camera with Your Android Phone - Make Tech Easier
Turn your old phone into a security camera for free - CNET
How to Turn an Old Android Phone into a Security Camera
How To Turn Your Android Device Into A Security Camera
How to Use Your Android Device as a Security Camera | Laptop Mag
microcontroller vs. System on chip - Electrical Engineering Stack Exchange
pcb - Chip vs printed circuit board - Electrical Engineering Stack Exchange
What is the difference between printed circuit board (PCB), IC, OP AMP and chip? - Quora
System-on-Chip vs Single-Board Computer: A Comparison Guide
What are the major differences between an SBC (single board computer) and SoC (system on chip)? - Quora
What are the differences between single board computer and microcontroller? - Quora
Hardware Fundamentals: what exactly is a microcontroller?
Microprocessors vs. Microcontrollers vs. SoCs: All You Need to Know
FPGAs, SoCs, Microcontrollers— A Quick Rundown of IoT Devices | Hacker Noon
programming - Is arduino a single board computer? - Arduino Stack Exchange
Single-board microcontroller - Wikipedia
Comparison of single-board microcontrollers - Wikipedia
Single-board computer - Wikipedia
Comparison of single-board computers - Wikipedia
Microcontroller - Wikipedia
System on a chip - Wikipedia

MATHS - ALGORITHMICS

Loop invariant - Wikipedia
Invariant (mathematics) - Wikipedia
Correctness (computer science) - Wikipedia
Precondition - Wikipedia
Postcondition - Wikipedia
Model checking - Wikipedia
Hoare logic - Wikipedia
lec08-loop-invariant.pdf
161-section-1.pdf
CS 136, Lecture 12
From loop invariants to recursion invariants | Beta reduction
algorithm - General proof strategies to show correctness of recursive functions? - Stack Overflow
loop-invariants
Loop invariants can give you coding superpowers · YourBasic
What is the best way of determining a loop invariant? - Stack Overflow
lec07.pdf
lec08.pdf
Prove correctness of recursive algorithm - Computer Science Stack Exchange
Startpage.com - The world's most private search engine
strong vs weak induction at DuckDuckGo
Mathematical induction - Wikipedia
Vacuous truth - Wikipedia
Empty set - Wikipedia
logic - How can I correct my wrong Intuition that $\forall \, x \, \in \,\emptyset : P(x) \quad $ is false? - Mathematics Stack Exchange
logic - Vacuous Truth and Universal Conditional Statements - Mathematics Stack Exchange
logic - Intuition behind Vacuous proofs - Mathematics Stack Exchange
elementary set theory - vacuous truth -> empty set is both included and not included in every set? - Mathematics Stack Exchange
elementary set theory - Aren't vacuous statements True and False simultaneously? - Mathematics Stack Exchange
elementary set theory - If $A$ is an empty set, how should I understand $\forall x\in A$? - Mathematics Stack Exchange
logic why false implies true at DuckDuckGo
logic - "false implies true" is a true statement - Mathematics Stack Exchange
logic - How does false false imply true? - Mathematics Stack Exchange
In mathematical logic, why does false imply everything? - Quora
Math Forum - Ask Dr. Math
Falsity implies anything
Paradoxes of material implication - Wikipedia
Newest 'correctness-proof' Questions - Computer Science Stack Exchange

MATHS - NUMERAL SYSTEMS STUDY

Radix - Wikipedia
Method of complements - Wikipedia
Ones' complement - Wikipedia
Two's complement - Wikipedia
Binary Subtraction with 2's Complement - Stack Overflow
Positional notation - Wikipedia
Binary-coded decimal - Wikipedia
Non-standard positional numeral systems - Wikipedia
Signed number representations - Wikipedia
Binary-to-text encoding - Wikipedia
why base 10 numeration system is the most popular at DuckDuckGo
Why have we chosen our number system to be decimal (base 10)? - Mathematics Stack Exchange
Why do we use decimal system? - Mathematics Stack Exchange
Is '$10$' a magical number or I am missing something? - Mathematics Stack Exchange
Roman numerals - Wikipedia
Math Forum - Ask Dr. Math
Order theory - Wikipedia
arithmetic - Proof of the standard algorithm for addition? - Mathematics Stack Exchange
why positional system start from position 0 at DuckDuckGo
Solved: Why is a symbol for zero needed in a positional system? | Chegg.com
Babylonian cuneiform numerals - Wikipedia
0 - Wikipedia
non positional number systems at DuckDuckGo
Difference Between Positional and Non-Positional Number Systems
What is a non-positional number system? - Quora
What is the difference between a positional number system and a non-positional number system? - Quora
Positional notation - Wikipedia
Nonpositional numeral systems - OeisWiki
List of numeral systems - Wikipedia
Numbering Systems and Computer Codes

NETWORKING FUNDAMENTALS

subnetting theory course pdf - Recherche Google
subnetting theory course pdf - Recherche Google
osi model pdf - Recherche Google
TCP vs UDP, TCP IP Model vs OSI & More | Pluralsight
Video Notes: Tanenbaum, Wetherall Computer Networks 5e
youtube.com/playlist?list=PLXKn7LtkQIZWADmS-mzdgUHisw7ytRUXr
youtube.com/watch?v=HRQkdSKz5TU&t=1455s&list=PLXKn7LtkQIZWADmS-mzdgUHisw7ytRUXr&index=1
Wonder How To » Fresh Hacks For a Changing World
Hacker Fundamentals: A Tale of Two Standards « Null Byte :: WonderHowTo
Hacker Fundamentals: The Everyman's Guide to How Network Packets Are Routed Across the Web « Null Byte :: WonderHowTo
frame vs packet networking at DuckDuckGo
networking - Difference between PACKETS and FRAMES - Stack Overflow
internet - What are the differences in the contents of datagrams, frames, and network packets? - Network Engineering Stack Exchange
What is the difference between a packet and a frame with reference to the OSI model? - Quora
slashroot.in/difference-between-segments-packets-and-frames
the internet undersea world at DuckDuckGo
best tutorial packet tracer cisco at DuckDuckGo
How to learn how to use Cisco Packet Tracer from beginning - Quora
Cisco Packet Tracer Tutorial - Resources to Download Cisco Packet Tracer
why is there 65536 ports at DuckDuckGo
Is there a hard limit of 65536 open TCP connections per IP address on linux? - Super User
networking - Why do computers have 65,535 TCP ports? - Super User
Encapsulation (networking) - Wikipedia
ip - Why Are There Only 65,535 Ports, and Will We Ever Have More? - Server Fault
65,536 - Wikipedia
routing - Ping between different subnet across a link - Network Engineering Stack Exchange

OS KERNEL PROGRAMMING & HACKING

Kernel Hacking Guides — The Linux Kernel documentation
unix kernel hacking - Recherche Google
sprg.uniroma2.it/kernelhacking2006/
4 paths to being a kernel hacker
The Linux Kernel Module Programming Guide
LKMPG/LKMPG-4.14.8.org at master · qshan/LKMPG · GitHub
Linux Loadable Kernel Module HOWTO
Loadable kernel module - Wikipedia
Difference between Linux Loadable and built-in modules - Stack Overflow
linux - What's the difference between insmod and modprobe? - Stack Overflow
modprobe - Wikipedia
kernel.org/doc/Documentation/kbuild/makefiles.txt
kernel.org/doc/Documentation/kbuild/modules.txt
What is the functional difference between kbuild and normal makefile? - Quora
Writing your First Linux driver in the Classroom | Playing with Systems
Linux Device Drivers, Third Edition [LWN.net]
Linux_Kernel_Newbies - Linux Kernel Newbies
Easy Intro to Linux Kernel Programming - YouTube
Introduction to Kernel Modules and Kbuild - YouTube
Exploring the Linux kernel: The secrets of Kconfig/kbuild | Opensource.com
kernel image path linux at DuckDuckGo
boot - Once booted, Find Full Path of Kernel Image? - Unix & Linux Stack Exchange
Where can I find the Linux kernel file? - Super User
install other kernel unix at DuckDuckGo

PRIVACY - ENDPOINT - ANDROID

How to Encrypt your Phone? (Guide to Encrypted Phone) | Beencrypted
Full disk encryption easily broken on tens of millions of Android devices - Neowin
Android’s full-disk encryption just got much weaker—here’s why | Ars Technica
Bits, Please!: Extracting Qualcomm's KeyMaster Keys - Breaking Android Full Disk Encryption
yahoo
How to Crack Android Full Disk Encryption on Qualcomm Devices
The full-disk encryption protecting your Android can be cracked | CSO Online
Google’s full-disk encryption in Android can be hacked – BGR
CVE-2014-10047 | Google Android Full Disk Encryption weak encryption (BID-103671)
Android Flaw Allows Full-Disk Crypto Bypass - BankInfoSecurity
android full disk encryption site:security.stackexchange.com - Google Search

PRIVACY - ENDPOINT - FDE THEORY

What is Full-Disk Encryption (FDE)? – TechTalks
Difference between Fast Encryption and Full Device Encryption - Computers | Android Forums
Key management - Wikipedia
Public key infrastructure - Wikipedia
Password management - Wikipedia
Disk encryption theory - Wikipedia
Disk encryption - Wikipedia
Disk encryption software - Wikipedia
Comparison of disk encryption software - Wikipedia
Filesystem-level encryption - Wikipedia
List of cryptographic file systems - Wikipedia
Attention Required! | Cloudflare
Full disk encryption | Surveillance Self-Defense
Data remanence - Wikipedia
Hardware-based full disk encryption - Wikipedia
Crypto-shredding - Wikipedia
Data erasure - Wikipedia
Self-encrypting drive VS full disk encryption VS volume encryption
Hardware full disk encryption technology for military applications using two-layer commercial solutions - Military Embedded Systems
Full Disk Encryption vs Storage Encryption - Information Security Stack Exchange
ubuntu - Is suspend-to-ram really a meaningful risk for Full Disk Encryption? - Information Security Stack Exchange
physical - How does full memory encryption in newer processes protect against DMA attacks? - Information Security Stack Exchange
Is it possible to prevent a physical attack on full disk encryption? - Information Security Stack Exchange
attacks - Breaking full-disk encryption on a computer that's rarely used - Information Security Stack Exchange
destruction - Erasing a hard-disk, encrypting it as alternative? - Information Security Stack Exchange
If /system partition is never encrypted (even in "full-disk" encryption), how is it protected? - Android Enthusiasts Stack Exchange
Isn't file encryption good enough? - Information Security Stack Exchange
Full disk encryption vs home folder encryption - why should the former be chosen over the latter - Information Security Stack Exchange
encryption - Crypto-shredding & backups of keys - Information Security Stack Exchange
Crypto shredding: How it can solve modern data retention challenges | by Brent Robinson | Medium
Cryptographic Erasure: Moving Beyond Hard Drive ...
Blog | GB Advisors
Information Security Office
Key Management and Full Disk Encryption (FDE)
Disk Encryption 101
Full-Disk Encryption Works - Schneier on Security
Full Disk Encryption - an overview | ScienceDirect Topics
You & Your Data, Part 1: Full Disk Encryption | by Matt Millen | Medium
Is hardware based disk encryption more secure that software based? - Information Security Stack Exchange

PRIVACY - ENDPOINT - LINUX

How to nuke your encrypted Kali install | Kali Linux
beencrypted.com/how-to-encrypt-your-disk-in-linux/
Emergency self-destruction of LUKS in Kali | Kali Linux
Uncrackable: Secure Your Secrets with 4096-Bit Encryption « Null Byte :: WonderHowTo
EncryptedHome - Community Help Wiki
EncryptedPrivateDirectory - Community Help Wiki
How to Encrypt Your Home Folder After Installing Ubuntu
Linux File Encryption Using GPG
schneier.com/blog/archives/2014/10/iphone_encrypti_1.html
LUKS In-Place Conversion Tool
An Overview of the Unix Filesystem - Understanding the Linux Kernel, Second Edition [Book]
Unix filesystem - Wikipedia
Index of /~cs161/videos
opensource.com/article/18/4/ext4-filesystem
opensource.com/life/16/10/introduction-linux-filesystems
An introduction to Linux's EXT4 filesystem | Opensource.com
The Fundamentals of FDE: Comparing the Top Full Disk Encryption Products | Trusted Computing Group
Disk Encryption User Guide - Fedora Project Wiki
Secure cryptoprocessor - Wikipedia
Trusted Platform Module - Wikipedia
Authenticated encryption - Wikipedia
modes of operation - Why should I use Authenticated Encryption instead of just encryption? - Cryptography Stack Exchange
Encryption is less secure than we thought | MIT News
Security - ArchWiki
Data-at-rest encryption - ArchWiki
Difference between Fast Encryption and Full Device Encryption - Computers | Android Forums
Chapter 9. System tips
chosen plaintext attack - Is it possible to build a CPA-secure encryption scheme which remains secure even when the encryption of secret key is given? - Cryptography Stack Exchange
blog.pnb.io | 525: SSL handshake failed
Comparison of disk encryption software - Wikipedia
schneier.com/blog/archives/2012/12/breaking_hard-d.html
So long, TrueCrypt: 5 alternative encryption tools that can lock down your data | PCWorld
VeraCrypt - Wikipedia
Here's how to best secure your data now that the NSA can crack almost any encryption | PCWorld
where does a filesystem reside at DuckDuckGo
File system - Wikipedia
Understanding where the filesystem reside in order to understand why one cannot implement FDE after OS installation at DuckDuckGo
system installation - How can I install Ubuntu encrypted with LUKS with dual-boot? - Ask Ubuntu
system installation - Dual Boot Ubuntu full disk encrypted but Windows untouched - Ask Ubuntu
windows - Full disk encryption on dual boot system (Truecrypt/Veracrypt) - Information Security Stack Exchange
Dual boot Windows + Linux with encryption - Super User
Dual boot full disk encryption... And I'm too dumb to set it up, even with the various guides on the internet. : linux4noobs
ManualFullSystemEncryption - Community Help Wiki
full disk encryption on shared partition at DuckDuckGo
encryption - Should I encrypt my entire hard drive, or only a partition? - Information Security Stack Exchange
encryption - How to share an encrypted storage on Windows, Mac OS X and Linux in a secure way - Super User
Arch boot process - ArchWiki
Boot Sequence - OSDev Wiki
Multi-boot with full hard drive encryption and pre-boot authentication - Information Security Stack Exchange
hardware - Securing the bootloader - Information Security Stack Exchange
When using LUKS, which parts of the hard disk are not encrypted? - Information Security Stack Exchange
encryption - Mitigating the LUKS decryption key residing in RAM for FDE - Information Security Stack Exchange
Full Disk Encryption with VeraCrypt | by Andrew Douma | Medium
Which type of disk encryption protects the MBR (master boot record) file of the system? - Skillset
security - How to delete file(s) in secure manner? - Ask Ubuntu
linux - How to know if a disk is an SSD or an HDD - Unix & Linux Stack Exchange
Look before you leap into Disk Encryption

PRIVACY - ENDPOINT - SED

hardware based full disk encryption drive best vendors at DuckDuckGo
hardware based full disk encryption drive best vendors site:*.stackexchange.com at DuckDuckGo
DuckDuckGo — Privacy, simplified.
best self-encrypting drive vendors at DuckDuckGo
best self-encrypting drive vendors site:*.stackexchange.com at DuckDuckGo
how to buy self-encrypting drive at DuckDuckGo
how to buy self-encrypting drive site:*.stackexchange.com at DuckDuckGo
Full Disk Encryption Buyer's Guide
Comparison of encrypted external drives - Wikipedia
startpage.com/do/metasearch.pl
Hardware security module - Wikipedia
How secure is hardware Full disk encryption (FDE) for SSD's - Information Security Stack Exchange
256-bit AES encryption broken in SandForce SSD controllers - The Tech Report
wd.dvi - 1002.pdf
seds-at-risks.pdf
310.pdf
disk encryption - How do I verify that my FDE/SED Opal SSD is indeed encrypted - Information Security Stack Exchange
deletion - What can be recovered? Securely deleted files - Information Security Stack Exchange
encryption - Is it possible to tell if hard drive is encrypted? - Information Security Stack Exchange
disk encryption - How to tell if my laptop is protected by FDE? - Super User
Solid state of fear: Euro boffins bust open SSD, Bitlocker encryption (it's really, really dumb) • The Register
Help
Researchers Break Full-Disk Encryption of Popular SSDs | SecurityWeek.Com
linux - Laptops SSD: Hardware Encryption plus DM-Crypt/Luks - Security and Performance - Information Security Stack Exchange
Are there any hardware encryption solutions for my notebook? - Information Security Stack Exchange
aes - How secure is Intel SSD Encryption? - Information Security Stack Exchange
truecrypt - SSD full disk encryption - Information Security Stack Exchange
security - Are Macs vulnerable to the recent SSD encryption vulnerability? - Ask Different
Hardware encryption for flash drives - Information Security Stack Exchange
encryption - HDD password vs Bitlocker - Information Security Stack Exchange
Self-encrypting drives - ArchWiki
Think your SSD offers rock-solid encryption? Here’s why it’s time to think again…
I want the TRUTH about SSDs and FDE (Full Disk Encryption) / SED (Self-Encrypting Dri - Ars Technica OpenForum
Is it better to use Bitlocker or the built-in-drive-encryption that my SSD offers? - Super User
macbook pro - Why is a secure erase 'not necessary' for SSD's? - Ask Different
PDF.js viewer
ubuntu - How to wipe free disk space in Linux? - Super User

PRIVACY ANONYMITY LEARNING

Surveillance Self-Defense | Tips, Tools and How-tos for Safer Online Communications
All Tutorials | The Tin Hat
Restore Privacy | Your online privacy resource center
PrivacyTools - Encryption Against Global Mass Surveillance
Home | Me and my Shadow
Be Encrypted - Fight Against Data Theft & Cybercrime
GitHub - nikitavoloboev/privacy-respecting: Curated List of Privacy Respecting Services and Software
motherboard.vice.com/en_us/article/a37p94/what-is-threat-modeling
invisiblecomputer.wonderhowto.com/news/social-hacking-and-protecting-yourself-from-prying-eyes-0133944/
You need to encrypt all your data. This is how it’s done
Real people don't (just) need encryption / Boing Boing
How to Encrypt Your Texts, Calls, Emails, and Data | WIRED
How to Protect Your Webcam, Computer Screen, and Passwords | WIRED
The Encryption Debate Should End Right Now, After Vault 7, Shadow Brokers, WannaCry, and Petya | WIRED
What To Do If You've Been Doxed | WIRED
A radical proposal to keep your personal data safe | Richard Stallman | Opinion | The Guardian
How to Become Anonymous & Browse the Internet Safely « Null Byte :: WonderHowTo
TypoGuy Explaining Anonymity: Your Real Identity « Null Byte :: WonderHowTo
null-byte.wonderhowto.com/how-to/stay-as-anonymous-as-possible-online-0138088/

QUANTUM COMPUTING

Get started with the Quantum Development Kit (QDK) - Microsoft Quantum | Microsoft Docs
Get started with the Quantum Development Kit (QDK) - Microsoft Quantum | Microsoft Docs
Quantum computing foundations - Learn | Microsoft Docs
Untitled-12 - Quantum_Walks_and_Search_Algorithms-2nsEd_2018_Portugal.pdf
NB.pdf
Quantum Computation Primer - Part 1 - CodeProject
Programming a quantum computer: generating true random numbers
Copenhagen interpretation - Wikipedia
Introduction to the Quantum Katas - Microsoft Quantum | Microsoft Docs
Introduction to the Quantum Machine Learning Package - Microsoft Quantum | Microsoft Docs
GitHub - microsoft/Quantum: Microsoft Quantum Development Kit Samples
GitHub - microsoft/QuantumLibraries: Q# libraries for the Quantum Development Kit
GitHub - ebraminio/awesome-qsharp: A curated list of Q# code and resources.
GitHub - microsoft/QuantumKatas: Tutorials and programming exercises for learning Q# and quantum computing
Q# Blog
Everything you should know about the Quantum Development Kit, but were afraid to ask | Q# Blog
Quantum computing | Microsoft
Quantum Development Kit | Microsoft
Quantum Computing for Computer Scientists - YouTube
Practice Quantum Computing | Brilliant
Quantum computing - Wikipedia
Timeline of quantum computing and communication - Wikipedia
Q is for Quantum by Terry Rudolph - Q is for Quantum
Quantum Computing Since Democritus: Aaronson, Scott: 9780521199568: Amazon.com: Books
Quantiki | Quantum Information Portal and Wiki
Home Page For Umesh Vazirani
Startpage.com - The world's most private search engine
resource request - Is my background sufficient to start quantum computing? - Quantum Computing Stack Exchange
resource request - Programming quantum computers for non-physics majors - Quantum Computing Stack Exchange
emulation - Are there emulators for quantum computers? - Quantum Computing Stack Exchange
What programming languages are available for quantum computers? - Quantum Computing Stack Exchange
GitHub - rigetti/pyquil: A Python library for quantum programming using Quil.
Developing quantum algorithms for optimization problems
How Do You Code for a Quantum Computer?
How to program a quantum computer | by Dr James Wootton | Qiskit | Medium
Startpage.com - The world's most private search engine
What Is Quantum Computing? The Complete WIRED Guide | WIRED
What Exactly Is Quantum Computing?
Five ways quantum computing will change the way we think about computing
applications - Is quantum computing just pie in the sky? - Quantum Computing Stack Exchange
physical realization - What is the argument that practical quantum computers cannot be built? - Quantum Computing Stack Exchange
What’s the difference between quantum annealing and universal gate quantum computers? | by Anastasia Marchenkova | Quantum Bits | Medium
What are the models of quantum computation? - Quantum Computing Stack Exchange
A quantum computer that doesn't use entangled qubits has the same computational power as a classical one? - Quantum Computing Stack Exchange
architecture - Is Quantum Biocomputing ahead of us? - Quantum Computing Stack Exchange
algorithm - Classical Memory enough to store states up to 40 qubits quantum system? - Quantum Computing Stack Exchange
bloch sphere - Information content of qubits - Quantum Computing Stack Exchange
Startpage.com - The world's most private search engine
Post-quantum cryptography - Wikipedia
On quantum computing and cryptography | Quantum Bits
Quantum Computing and Cryptography - Schneier on Security
Advantage of quantum key distribution over post-quantum cryptography - Quantum Computing Stack Exchange
9783540887010-c1.pdf
cryptography - What kinds of encryption are _not_ breakable via Quantum Computers? - Information Security Stack Exchange
complexity theory - Is it possible for an encryption method to exist which is impossible to crack, even using quantum computers? - Quantum Computing Stack Exchange
What does a "real" quantum computer need for cryptanalysis and/or cryptographic attack purposes? - Cryptography Stack Exchange
Introduction
The quantum meltdown of encryption – TechCrunch
AI, quantum computing and 5G could make criminals more dangerous than ever, warn police | ZDNet
What next in the world of post-quantum cryptography? - Ericsson
Quantum Computing and its Impact on Cryptography
Waiting for quantum computing: Why encryption has nothing to worry about | TechBeacon
Is Quantum Computing an Existential Threat to Blockchain Technology?
Startpage.com - The world's most private search engine
The Limits of Quantum Computers - The_Limits_of_Quantum_Computers.pdf
Complexity and quantum computing | Quantum Bits
An update on quantum computing and complexity classes | Quantum Bits
Finally, a Problem That Only Quantum Computers Will Ever Be Able to Solve | Quanta Magazine
Scott Aaronson: Quantum and Classical Uncertainty
Poster: Automatically Solving NP-Complete Problems on a Quantum Computer - hu2018icse.pdf
Quantum + NP-Complete = No problem | by Brianna Gopaul | Coinmonks | Medium
npcomplete.dvi - npcomplete.pdf

REVERSE ENGINEERING - BINARY EXPLOITATION

InfoSec · AnarchoTechNYC/meta Wiki · GitHub
lowlevelprogramming-university/README.md at master · gurugio/lowlevelprogramming-university · GitHub
Page not found · GitHub · GitHub
Projects · RomaniukVadim / ctf-tools · GitLab
Modern Binary Exploitation - Spring 2015
Startpage.com - The world's most private search engine
github.com/radare/radare2
GitHub - radareorg/awesome-radare2: A curated list of awesome projects, articles and the other materials powered by Radare2
Introduction · Radare2 Book
Adding Metadata · Radare2 Book
Migration from ida, GDB or WinDBG · Radare2 Book
Home - r2wiki
Tips - r2wiki
Cheatsheet - r2wiki
Radare 2 in 0x1E minutes – Techorganic – Musings from the brainpan
moveax.me/radare2-visual-mode/
r2-cheatsheet.pdf
Server Not Found
Server Not Found
Tomas_Antecky-Disassembling_with_radare2.pdf
Getting started with Radare2
Max Kersten – Security through explanation
moveax.me/
Page not found · GitHub Pages
tools - How to handle stripped binaries with GDB? No source, no symbols and GDB only shows addresses? - Reverse Engineering Stack Exchange
strip - What are stripped and not-stripped executables in Unix? - Unix & Linux Stack Exchange
GDB – Debugging stripped binaries | Félix Abecassis
System V ABI - OSDev Wiki
PDF.js viewer
mpx-linux64-abi.pdf
325462-sdm-vol-1-2abcd-3abcd.pdf
www3.nd.edu/~dthain/courses/cse40243/fall2015/intel-intro.html
Basic CPU architecture – Max Kersten
Home · HJLebbink/asm-dude Wiki · GitHub
MOV · HJLebbink/asm-dude Wiki · GitHub
x86 and amd64 instruction reference
Mirror of: Into the Void: x86 Instruction Set Reference
Intel 80x86 Assembly Language OpCodes
coder32 edition | X86 Opcode and Instruction Reference 1.12
docs/x86.md at master · corkami/docs · GitHub
pics/opcodes_tables_compact.pdf at master · corkami/pics · GitHub
pics/elf101.pdf at master · corkami/pics · GitHub

SYSTEMS & NETWORKS PWNING

Offensive Computer Security Home Page (CIS 4930 / CIS 5930) Spring 2014
Hacking, 2nd Edition | No Starch Press
0x200 Programming - Shichao's Notes
Full Ethical Hacking Course - Network Penetration Testing for Beginners (2019) - YouTube
awesome-infosec/readme.md at master · onlurking/awesome-infosec · GitHub
InfoSec · AnarchoTechNYC/meta Wiki · GitHub
GNU Debugger - Wikipedia
Debugging with GDB
GDB Command Reference - Index page
Top (Debugging with GDB)
Linux Tutorial - GNU GDB Debugger Command Cheat Sheet
Using GDB to Develop Exploits - A Basic Run Through
Migration from ida, GDB or WinDBG · Radare2 Book
Chapter 20. Debugging a Running Application Red Hat Enterprise Linux 7 | Red Hat Customer Portal
Programmers Who Don't Understand Security Are Poor at Security - Schneier on Security
SEI CERT C Coding Standard - SEI CERT C Coding Standard - Confluence
Defensive Programming for Red Hat Enterprise Linux (and What To Do If Something Goes Wrong) - defprogramming.pdf
GitHub - HJLebbink/asm-dude: Visual Studio extension for assembly syntax highlighting and code completion in assembly files and the disassembly window
Home · HJLebbink/asm-dude Wiki · GitHub
Guide to x86 Assembly
abi386-4.pdf
Intel® 64 and IA-32 Architectures Software Developer’s Manual, Combined Volumes: 1, 2A, 2B, 2C, 2D, 3A, 3B, 3C, 3D and 4 - 325462-sdm-vol-1-2abcd-3abcd.pdf
Digital Attack Map
Gallery - Digital Attack Map
What is a DDoS Attack? - Digital Attack Map
DDoS Protection 101: What Is DDoS? | NETSCOUT
What is an Application Layer Attack? | NETSCOUT
What is a State-Exhaustion Attack? | NETSCOUT
What is a Volumetric DDoS Attack? | NETSCOUT
What Is a Distributed Denial-of-Service (DDoS) Attack? | Cloudflare
DNS Amplification DDoS Attack | Cloudflare
Reflections on reflection (attacks)
Domain Name System - Wikipedia
Classification of DDos attacks: a short overview of modern approaches
Amplification DDoS Attacks
Classification of DoS Attacks | INCIBE-CERT
Endpoint Denial of Service, Technique T1499 - Enterprise | MITRE ATT&CK®
Network Denial of Service, Technique T1498 - Enterprise | MITRE ATT&CK®
reflectionamplificationddospublic.pdf | Powered by Box
Denial-of-service attack - Wikipedia
How a Massive 540 Gb/sec DDoS Attack Failed to Spoil the Rio Olympics
User Datagram Protocol - Wikipedia
What is UDP? | Cloudflare
TCP vs UDP, TCP IP Model vs OSI & More | Pluralsight
Startpage.com - The world's most private search engine
Anonymous DDoS Brazilian Government Websites Because Rio Olympics
Rio Olympics Suffered Sustained 540GB/Sec DDoS Attacks
Denial of Service Attacks & DDoS Attacks: 2016 Summer Olympics
Brazil 2016 Summer Olympics: Hacker group Anonymous attacks feared
Practice.png (PNG Image, 4429 × 5100 pixels) - Scaled (18%)
crackme - Crack Me Material - Reverse Engineering Stack Exchange
Startpage.com - The world's most private search engine
Why are strings in C++ usually terminated with '\0'? - Stack Overflow
strcpy, strcpy_s - cppreference.com

VULNERABILITY HUNTING PROGRAMS

Full Ethical Hacking Course - Network Penetration Testing for Beginners (2019) - YouTube
Hacker-Powered Security Testing & Bug Bounty | HackerOne
HackerOne
Vulnerability Disclosure Guidelines | HackerOne
Home | Hacker101
HackerOne
Your Elastic Security Team, better security testing through bug bounties and managed security programs | Bugcrowd
Synack - Most Trusted Crowdsourced Penetration Testing Platform
ZERODIUM - The Leading Exploit Acquisition Platform
ZERODIUM - How to Sell Your 0day Exploit to ZERODIUM
Intigriti - Bug Bounty & Agile Pentesting Platform
Home | Zero Day Initiative
ARK Development and Security Bounty Program | by Rok Černec | ARK.io | Blog
Microsoft Bounty Programs | MSRC
Whitehat Program
Program Rules – Application Security – Google
Researcher Resources - How to become a Bug Bounty Hunter - Starter Zone - Bugcrowd Forum
Bug bounty program - Wikipedia
Bug Bounty Programs: A Quick Guide | by Threat Intel | Threat Intel | Medium
Bug Bounty Toolkit. Last updated: 8th June 2020 | by Craig Hays | BugBountyHunting | Medium
Tips from Top Hackers - How to fit bounties into your schedule and maximize payouts | @Bugcrowd
How To Do Your Reconnaissance Properly Before Chasing A Bug Bounty | by Hussnain Fareed | InfoSec Write-ups | Medium
Life as a bug bounty hunter | Hacker News
Server Not Found
Top 30 Bug Bounty Programs in 2020
Yet another talk on bug bounty
19-year-old makes millions from ethical hacking | ZDNet
#BugBounty — “I don’t need your current password to login into your account” - How could I… | by Avinash Jain (@logicbomb_1) | InfoSec Write-ups | Medium
#BugBounty — “How I was able to shop for free!”- Payment Price Manipulation | by Avinash Jain (@logicbomb_1) | InfoSec Write-ups | Medium
GitHub - streaak/keyhacks: Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
Zerodium Offers $1 Million for Tor Browser 0-Days That It will Resell to Governments
Microsoft launches Azure DevOps bug bounty program, $20,000 rewards on offer | ZDNet
Microsoft Offers $100,000 Bounty for Finding Bugs in Its Identity Services
Tesla's software bug bounty is going to the big leagues with Pwn2Own - Roadshow
Facebook Broadens Its Bug Bounty to Include Third-Party Apps | WIRED
Samsung Launches Bug Bounty Program — Offering up to $200,000 in Rewards
Facebook Offering $40,000 Bounty If You Find Evidence Of Data Leaks
Get paid up to $40,000 for finding ways to hack Facebook or Instagram accounts
Intel Corporation - Bug Bounty Program | HackerOne
A Company Offers $500,000 For Secure Messaging Apps Zero-Day Exploits
Get $1M for reporting zero-day flaws in Tor to "help Govt fight crime"
Warning: Potential Security Risk Ahead
EdOverflow | “CI Knew There Would Be Bugs Here” — Exploring Continuous Integration Services as a Bug Bounty Hunter
Bug bounty: Hack Tesla Model 3 to win your own Model 3
YouTube
EP3: How to be a paid bug bounty hunter (EN) - YouTube
Hackers are making big bucks working for the good guys
White Hat Hacking: Hack the Pentagon? « Null Byte :: WonderHowTo
The Department of Defense's Bug Bounty Program Has Flagged Thousands of Vulnerabilities
A superstar Chinese hacker just won $112,000 from Google, its largest bug bounty ever
Chromebook exploit earns researcher second $100k bounty – Naked Security
Drone maker DJI in cyber-security row over bug bounty - BBC News
Two New Spectre-Class CPU Flaws Discovered—Intel Pays $100K Bounty
Uber used bug bounty program to launder blackmail payment to hacker | Ars Technica
Facebook Bug Bounty Program Makes Biggest Reward Payout Yet | WIRED
Life as a bug bounty hunter: a struggle every day, just to get paid | MIT Technology Review
Three's a crowd: Popular bug bounty companies are growing at an insane rate - CyberScoop

WEB SECURITY & PENTESTING

Full Ethical Hacking Course - Network Penetration Testing for Beginners (2019) - YouTube
GitHub - coreb1t/awesome-pentest-cheat-sheets: Collection of the cheat sheets useful for pentesting
OWASP Testing Guide v4 Table of Contents - OWASP
owasp.org/index.php/Conduct_search_engine_discovery/reconnaissance_for_information_leakage_(OTG-INFO-001)
Application Security Wiki
Application Security Wiki
Techniques - PRE-ATT&CK | MITRE ATT&CK®
How to Use SecGen to Generate a Random Vulnerable Machine « Null Byte :: WonderHowTo
How to Attack a Vulnerable Practice Computer: A Guide from Scan to Shell « Null Byte :: WonderHowTo
Nmap Cheat Sheet
Nmap Cheat Sheet and Pro Tips | HackerTarget.com
Problem loading page
VM Kali Linux - nmap why is so slow? - Information Security Stack Exchange
A Practical Guide to Nmap (Network Security Scanner) in Kali Linux
How to Spider Web Pages with Nmap for SQLi Vulnerabilities « Null Byte :: WonderHowTo
Hack Like a Pro: How to Conduct Active Reconnaissance and DOS Attacks with Nmap « Null Byte :: WonderHowTo
Nikto, NMap , Skipfish and friends – VulPoint
nmap - How to find live hosts on my network? - Information Security Stack Exchange
How to Automate Brute-Force Attacks for Nmap Scans « Null Byte :: WonderHowTo
networking - How to scan an entire network using Nmap? - Ask Ubuntu
explainhownow.com/2019/scan-networks-with-nmap/
How to Get Started Writing Your Own NSE Scripts for Nmap « Null Byte :: WonderHowTo
Advanced Nmap: Top 5 Intrusive Nmap Scripts Hackers & Pentesters Should Know « Null Byte :: WonderHowTo
Hack Like a Pro: How to Conduct Passive OS Fingerprinting with p0f « Null Byte :: WonderHowTo
HelpUiTabsBreakpoints · zaproxy/zap-core-help Wiki · GitHub
Hacking Web Apps « Null Byte :: WonderHowTo
Community Byte: HackThisSite Walkthrough, Part 1 - Legal Hacker Training « Null Byte :: WonderHowTo
Google Hacking Database (GHDB) - Google Dorks, OSINT, Recon
69.164.223.171
pentestit.com/shodan-queries/
Home
Vulnerability Scanner - Web Application Security | Acunetix
Hackazon
what to do with nmap result at DuckDuckGo
Nmap Cheat Sheet: From Discovery to Exploits - Part 1: Introduction to Nmap

g14_setup

set up asus zephyrus g14 - Recherche Google
DEFINITIVE - Compiled MegaList of FAQ, Tips, and Fixes to Common Problems for New (and Old) G14 Users! : ZephyrusG14
https://www.reddit.com/r/ZephyrusG14/comments/hq043o/how_to_get_pg_updown_home_and_end_keys/
Review: 2020 Asus Zephyrus G14
How to set up new G14 : ZephyrusG14
What are you all doing to increase battery life? : ZephyrusG14
Battery life on G14 isn't good after 5 or so power cycles : ZephyrusG14
Since it seems to be a deal breaker for some, here is some pictures of a G14 Moonlight White keyboard with no/all backlighting settings (June batch) : ZephyrusG14
Summary about controlling fans/boost/TDP - all is possible : ZephyrusG14
map end page down keys in 14 inch laptops - Recherche Google
Solved: Lack of PgUp/PgDown/Home/End keys PAIN - Dell Community
Evolution of Laptop Keyboards, No More Page Up/Down Keys!
Mini keyboard has no home/end keys; how to type them? - Super User
Home, end, pgdown and page up keys : ZephyrusG14
AutoHotkey
keybiard mapping windows - Recherche Google
Guide: How to check a new laptop for issues - NotebookCheck.net Tech
How We Test Laptops | PCMag
How To Unbox and Quality Check a New Laptop
How to Set Up Your New Laptop Like a Pro: Out of the Box Tips | Laptop Mag
How do I reassign hot keys for my keyboard?
page up hotkey windows - Google Search
All the Windows 10 keyboard shortcuts you need to know - CNET
fix keyboard baklight brightness g14 - Google Search
Use Windows Settings to see what's using the most disk space
The Asus ROG Zephyrus G14 has progressed beyond the need for vowels - The Verge

WD_Repair

What To Do After Dropping An External Hard Drive | Datarecovery.com
SOLVED: Dropped portable hard drive - Western Digital My Passport Ultra - iFixit
How to recover data from a hard drive (stuck heads: buzzing, clicking, etc) - YouTube
How to fix a broken hard drive Beeping noise or clicking RECOVER GET DATA BACK FOR FREE! BEST TRICK - YouTube
My WD External hard drive not recognised - WD External Drives / WD Portable Drives - WD Community
The Dropped External Hard Drive Won't Show Up | Small Business - Chron.com
I dropped my WD elements hard disk by mistake. When connecting to the computer, it makes some noise and doesnt get detected. Can it be fixed? How? - Quora
Startpage.com Search results
External Western Digital Drive Makes Beeping Noise - Data Analyzers
WD passport not working after fallen down | Tom's Hardware Forum
WD My Passport Beeping Noise HELP ! ! ! | Tom's Hardware Forum
hard drive - Western Digital My Passport Beeps - Super User
troubleshooting - Western Digital drive making beeping noise - Super User
Startpage.com Search results
13.04 - How to repair an external harddrive? - Ask Ubuntu
linux - How to recover data from heavily damaged external hard drive? - Super User
How do I recover lost/inaccessible data from my storage device? - Super User
How do I recover lost/inaccessible data from my storage device? - Super User
Startpage.com Search results
How to Fix Disk 1 Unknown Not Initialized in Windows 10/8/7?
Different Ways to Fix Disk Unknown Not Initialized in Windows 10
6 Ways to Fix Disk Unknown Not Initialized in Windows 10/8/7 - EaseUS
2 new messages
Best Free Bit Copy Software for Windows 10/8/7 - AOMEI Backupper
How to Clone a Hard Drive -
Hard drive failing so I want to clone it | Tom's Hardware Forum
How To Extract Files From a Dead Hard Drive
hard drive - Should I do a bit-to-bit copy or a mirror of my damaged, encrypted HDD? (And how?) - Super User
Ddrescue - GNU Project - Free Software Foundation (FSF)
GNU ddrescue Manual
Startpage.com Search results
GNU ddrescue – The Best Damaged Drive Rescue - Linux.com
SystemRescueCd - System Rescue Cd Homepage
DIY Video 2 How to fix a broken hard drive Beeping noise Get your data Back! Best Kept Secret - YouTube
Data Recovery On A Dead Hard Drive With Failed Heads - YouTube

Other Bookmarks

Secure Processors Part I: Background, Taxonomy for Secure Enclaves and Intel SGX Architecture - trusted processors, CPUs
CIS Benchmarks - Center for Internet Security
Hackuna - The First Android Mobile App to Track Hackers
Automate your Python code tests with tox | Opensource.com
GitHub - am0nt31r0/OSINT-Search: Useful for digital forensics investigations or initial black-box pentest footprinting.
Stealing Ethereum by Guessing Weak Private Keys - blockchain cryptocurrency hacking - Schneier on Security
5 Cybersecurity Best Practices You Should Be Following Right Now
GitHub - We5ter/Flerken: Open-Source Obfuscated Command Detection Tool
Over Dozen Popular Email Clients Found Vulnerable to Signature Spoofing Attacks
Defending Democracies Against Information Attacks - privacy, government surveillance - Schneier on Security
Security Experts Unite Over the Right to Repair - planned obsolescence | WIRED
GitHub - SpiderLabs/HostHunter: HostHunter a recon tool for discovering hostnames using OSINT techniques.
Sensitive data of 80 million US households exposed online - privacy, anonymity
Hackers Found Exploiting Oracle WebLogic RCE Flaw to Spread Ransomware
DHS Orders Federal Agencies to Patch Critical Flaws Within 15 Days - Cyberwarfare
Write faster C extensions for Python with Cython | Opensource.com
On Security Tokens - Multi factor authentication - Schneier on Security
What is the IoT? Everything you need to know about the Internet of Things right now - Fundamentals, smart cities | ZDNet
IoT devices are an enterprise security time bomb | ZDNet
I know what you ate last supper: What home sensors will reveal about your life - IoT security, privacy, smart homes - TechRepublic
Internet of Things security woes: Can smarter consumers save the IoT from disaster? | ZDNet
History repeating: How the IoT is failing to learn the security lessons of the past | ZDNet
bluetooth-inherent-security-issues
Why IoT devices pose a bigger cybersecurity risk than most realize | ZDNet
When your IoT goes dark: Why every device must be open source and multicloud - IoT Security | ZDNet
6 things keeping IoT pros up at night - IoT Security - TechRepublic
IoT security crackdown: Stop using default passwords and guarantee updates, tech companies told | ZDNet
Mysterious hacker has been selling Windows 0-days to APT groups for three years - Darknet, Underground Vulnerability Market | ZDNet
Putin signs Runet law to cut Russia's internet off from rest of world - Government Surveillance | ZDNet
Hackers lurked in Citrix systems for six months -. APT attacks | ZDNet
JavaScript card sniffing attacks spread to other e-commerce platforms - Magecart Group 12, hacking group, Marento based ecommerces | ZDNet
Hacktivists Are on the Rise—but Less Effective Than Ever - Hacking Groups, Anonymous | WIRED
Mozilla announces ban on Firefox extensions containing obfuscated code - extension code audit, browser security | ZDNet
New Google Chrome mobile phishing scam can steal private data - spoofing
Law enforcement seizes dark web market after moderator leaks backend credentials - anonymity throughout atacks | ZDNet
Facebook and the ‘phenomenon of trust and ignorance’: La Trobe - industrial privacy violations | ZDNet
China uses biometrics and digital scanning 'data doors' to track Muslim minority - cyberwarfare | ZDNet
Cybersecurity for the Public Interest - government surveillance - Schneier on Security
Ericsson: 5G can boost enterprise revenue, but security controversy slowing down industry | ZDNet
Singapore, Canada complete blockchain trial for cross-border payments | ZDNet
Google's Fuchsia OS: Everything You Need to Know | Digital Trends
Fuchsia OS: What you need to know - It's FOSS
Fuchsia OS Explained :-The Future of Android?
How do I add the DuckDuckGo .onion version to the Tor Browser search providers? - Tor Stack Exchange
Is it safe to use Adblock Plus addon with Tor Browser Bundle? - Tor Stack Exchange
How to properly start tor service - Tor Stack Exchange
Fishing in the Piracy Stream: How the Dark Web of Entertainment is Exposing Consumers to Harm - Malware Spreading through video streaming
How to Choose Between 720p, 1080i, and 1080p Resolutions
Putin Will Put Russia Behind an Internet Curtain | WIRED
Hackers steal card data from 201 online campus stores from Canada and the US -Magecart hacking group breached PrismRBS and modified the PrismWeb​ e-commerce platform.| ZDNet
How to Install and Use Tor Network in Your Web Browser
GitHub - ropnop/kerbrute: A tool to perform Kerberos pre-auth bruteforcing
A hacker is wiping Git repositories and asking for a ransom | ZDNet
Security flaws in 100+ Jenkins plugins put enterprise networks at risk | ZDNet
Security flaw lets attackers recover private keys from Qualcomm chips - Hardware Security - Qualcomm Secure Execution Environment (QSEE) vulnerabilities
Hacker takes over 29 IoT botnets - C2 Servers Compromise | ZDNet
Europol Shuts Down Two Major Illegal 'Dark Web' Trading Platforms - TOR Vulnerabilities, Anonymity. throughout attack
A Mysterious Hacker Group Is On a Supply Chain Hijacking Spree | WIRED
This password-stealing malware just evolved a new tactic to remain hidden - Detection Evasion | ZDNet
How Can Foreigners Set Up Businesses in Singapore? | SingaporeLegalAdvice.com
U.S. will rethink cooperation with allies who use Huawei: official - cyberwarfare, 5G security risks - Reuters
Open source has a working-for-free problem
ProtonMail now offers elliptic curve cryptography ECC for advanced security and faster speeds - vs RSA, timing attack, X25519/Curve25519 systems - ProtonMail Blog
Hacker Finds He Can Remotely Kill Car Engines After Breaking Into GPS Tracking Apps - Car Hacking - Motherboard
The Difference Between 720p and 1080i
Flat Panel TV Info - 720i vs. 720p vs. 1080i vs. 1080p
A (relatively easy to understand) primer on elliptic curve cryptography - ECC fundamentals/basics | Ars Technica
GitHub - cisco/joy: A package for capturing and analyzing network flow data and intraflow data, for network research, forensics, and security monitoring. Traffic analysis
Japanese government to create and maintain defensive malware - cyberweapon, cyberwarfare | ZDNet
NATO Declares Cyber an Official Warfare Battleground, Next to Air, Sea and Land. - cyberwarfare
What Is Application Shielding? DRM, Obfuscation, Reverse Engineering | WIRED
Marketplaces and ecommerces comparison : Priceminister, Cdiscount, Fnac, Amazon, Rue du commerce, La Redoute, Pixmania, etc... | E-commerce Enhancer
Chipset - Data Flow Management System that manages the data flow between the processor, memory and peripherals.
Kensington Security Slot - physical laptop anti theft system - Wikipedia
What Is a “Chipset”, and Why Should I Care?
Red Teaming - Command and Control C2 Server - Hacking Articles
Israel Retaliates To A Cyber-Attack With Immediate Physical Action In A World First - cyberwarfare, physical military response to cyberattack
First Physical Retaliation for a Cyberattack - zionist regime attack against Hamas - definitive - Schneier on Security
What Israel's Strike on Hamas Hackers Means For Cyberwar | WIRED
WhatsApp vulnerability exploited to infect phones with Israeli spyware | Ars Technica
WhatsApp hackers hit iPhone and Android users in 'advanced' cyber attack - israeli nso group - Mirror Online
WhatsApp vulnerability: How to update WhatsApp on iPhone or Android - Israeli nso group | Metro News
WhatsApp security issues: Hackers attack iPhones and Androids with code - nso israeli group | Metro News
It's 2019 and a WhatsApp call can hack a phone: Zero-day exploit infects mobes with spyware - israeli nso group, buffer overflow • The Register
CVE-2019-3568 , israeli nso group
Hackers Used WhatsApp 0-Day Flaw to Secretly Install Spyware On Phones - israeli nso group, buffer overflow
Amazon.com: gaming laptop amd ryzen
Quantum Computing Concepts | Microsoft Docs
security - How to securely delete data after rm - secure deletion/erasure, shred, filesystem journal - Unix & Linux Stack Exchange
Process (computing) - Wikipedia
Computer program - Wikipedia
Difference: Program VS Process VS Thread | Yumi Chan's Blog
What is difference between thread, process and program? - Quora
Difference between a process and a program - operating system
multithreading - Task vs. process, is there really any difference? - Stack Overflow
multithreading - Why should I use a thread vs. using a process? - Stack Overflow
Scavenger - Is A Multi-Threaded Post-Exploitation Scanning Tool For Scavenging Systems, Finding Most Frequently Used Files And Folders As Well As "Interesting" Files Containing Sensitive Information - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
What the US Can Learn from Israel and China's Collaboration | WIRED
7 CI/CD tools for sysadmins | Opensource.com
Hacker Discloses New Unpatched Windows Zero-Day Exploit On Twitter
The Meteorite Hunters Who Descended on the Carancas Fall | WIRED
Fourth Industrial Revolution - Wikipedia
Industry 4.0 - Wikipedia
New Malware Takes Commands From Memes Posted On Twitter
Russia's IRA Targeted Black Americans, Exploiting Racial Tensions | WIRED
How Instagram Became the Russian IRA's Go-To Social Network | WIRED
How Russian Trolls Used Meme Warfare to Divide America | WIRED
How To Install OpenLDAP Server for Centralized Authentication
Punk.Py - Unix SSH Post-Exploitation Tool - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Vital Concepts for the Modern JavaScript Developer | Toptal
David-Reguera-Garcia-Dreg (David Reguera Garcia aka Dreg) · GitHub
Clean Architecture on Android | Toptal
Wim ten Brink's answer to What is the most complicated piece of code ever written? - Quora
windows linux subsystem implementation - Google Search
How Does the Windows 10 Subsystem for Linux Work and What Is It For? - Petri
Why the Windows Subsystem for Linux Matters to You – Even if You Don’t | IT Pro
How does JVM works internally? - Quora
Windows Subsystem for Linux: Architectural Overview | Seth Juarez | Channel 9
Emacs on the Linux Subsystem for Windows - The Lone C++ Coder's Blog
Why don't they call it 'Windows subsystem for GNU'? - Quora
Windows Subsystem for Linux – The underlying technology enabling the Windows Subsystem for Linux
Problem loading page
Learn about the Windows Subsystem for Linux | Microsoft Docs
Problem loading page
pyHAWK - Searches The Directory Of Choice For Interesting Files. Such As Database Files And Files With Passwords Stored On Them - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Mayday! NASA Warns Employees of Personal Information Breach
Why can't hackers make Xcode to run on Windows? - Quora
Hackers are increasingly destroying logs to hide attacks | ZDNet
If Wi-Fi security is a real concern, launch a virtual private network – The Seattle Times
Two botnets are fighting over control of thousands of unsecured Android devices | ZDNet
Remove Time Limit From Trial Software With Time Stopper
Forfait — Wikipédia
c++ - Deviarev2 Hook API: Hook into existing process winapi calls? - Stack Overflow
c++ - Intercepting WinAPI calls and modifying return values - Stack Overflow
middleware vs operating system at DuckDuckGo
webserver - What is the difference between "middleware" and "application server"? - Stack Overflow
What is Middleware - Definition and Examples | Microsoft Azure
operating system - Virtual Machine Vs. Middleware - Stack Overflow
jvm vs vm at DuckDuckGo
jvm - Is the Java Virtual Machine really a virtual machine in the same sense as my VMWare or Parallels file? - Stack Overflow
java - What is the difference between DVM and JVM? - Stack Overflow
stack based machine vs register based machine at DuckDuckGo
Why is the JVM stack-based and the Dalvik VM register-based? - Stack Overflow
Stack machine - Wikipedia
Which architecture do modern computers use? - Computer Science Stack Exchange
Get started with Remote Desktop on Android | Microsoft Docs
remote desktop windows from linux at DuckDuckGo
Connect to a Windows PC from Ubuntu via Remote Desktop Connection | Digital Citizen
windows remote desktop wiki at DuckDuckGo
windows remote desktop vs team viewer at DuckDuckGo
xen desktop vs team viewer at DuckDuckGo
rdp vs vnc at DuckDuckGo
Remote Desktop Roundup: TeamViewer vs. Splashtop vs. Windows RDP
WinPcap - Home
usbpcap at DuckDuckGo
USBPcap
USBPcap Tutorial? - Wireshark Q&A
PenTest: Mighty Python - Pentestmag
SBC: Penetration Testing with Raspberry Pi (W42) - Hakin9 - IT Security Magazine
BashFAQ/031 - Greg's Wiki
files - How are chown and chmod command different in the given operation? - Unix & Linux Stack Exchange
Radboud University researchers discover security flaws in widely used data storage devices - Radboud University
honor mobile tethering linux interface not recognized at DuckDuckGo
What is the difference between 'git pull' and 'git fetch'? - Stack Overflow
boost beast websocket stream at DuckDuckGo
boost/beast/websocket/stream.hpp - develop
Travis Casey's answer to Why did Intel name their processors as i3, i5 and i7 instead of i2, i4 and i6 or i1, i2, i3, i4 and so on? - Quora
PortSmash : une nouvelle faille critique qui affecte les CPU Intel exploitant l'Hyperthreading ou le SMT, des CPU AMD pourraient aussi être touchés
Des attaquants exploitent une vulnérabilité logicielle sur des Appliances Cisco, aucune mise à jour ne résout ce problème à l'heure actuelle
Les hackers pourraient bientôt s'attaquer au cerveau humain, pour dérober des souvenirs ou provoquer des lésions cérébrales
Hackers attacking your memories: science fiction or future threat? | Securelist
Cisco Adaptive Security Appliance Software and Cisco Firepower Threat Defense Software Denial of Service Vulnerability
Il existe « quelques preuves » d'un lien entre le rayonnement des téléphones cellulaires et le cancer, selon une importante étude
Invisi-Shell - Hide Your Powershell Script In Plain Sight (Bypass All Powershell Security Features) - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Hacker Who DDoSed Sony, EA and Steam Gaming Servers Pleads Guilty
A DJI Bug Exposed Drone Photos and User Data | WIRED
HSBC suffers data breach after hackers access customers' personal data
Best Anonymization Tools and Techniques for 2019 - definitive
Does your team need to learn how to break things? | Opensource.com
node.js - Why use AJAX when WebSockets is available? - Stack Overflow
Overview of Build Systems
How to spy on someone's phone without touching theirs - Quora
hping - Wikipedia
tcpdump - Using hping to inject packet into TCP netcat connection - Stack Overflow
hping vs netcat - Google Search
Wappalyzer - Technologies
WIFI is abbreviation for what? - Quora
Wi-Fi - Wikipedia
Facebook Used Its VPN to Spy on Other Companies, Users - ExtremeTech
New Adobe Flash Zero-Day Exploit Found Hidden Inside MS Office Docs
wired.com/story/private-firms-do-government-dirty-work/
uint8_t vs unsigned char at DuckDuckGo
stackoverflow.com/questions/28509796/boostasio-how-to-read-full-buffer-in-right-way
command line - Why does "ps aux | grep x" give better results than "pgrep x"? - Ask Ubuntu
askubuntu.com/questions/129962/ps-ef-vs-ps-aux
stackoverflow.com/questions/26656943/how-to-get-data-in-python-from-ros-in-real-time
enigma reverse engineering - Google Search
vmprotect reverse engineering at DuckDuckGo
oep reverse engineering - Google Search
Shebang (Unix) - Wikipedia
stackoverflow.com/questions/1123650/how-to-find-the-return-value-of-last-executed-command-in-unix
idl format at DuckDuckGo
Ultimate solutions to unmask hidden WordPress malware by Zehra Ali - Hakin9 - IT Security Magazine
Threat Intelligence: A Different Approach to Meet Cyber Security Needs by Jonathan Zhang - Hakin9 - IT Security Magazine
Trello vs. Jira Comparison | Toptal
debit card skimmer at DuckDuckGo
signed number representation depend architecture - Google Search
DOJ Indicts 2 Iranian Hackers for Harmful SamSam Ransomware | WIRED
thehackernews.com/2018/11/samsam-ransomware-iranian-hackers.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+TheHackersNews+%28The+Hackers+News+-+Security+Blog%29&m=1
Russian Hackers Haven't Stopped Probing the US Power Grid | WIRED
D-Bus - Wikipedia
evemu tool at DuckDuckGo
iec vs iso at DuckDuckGo
snmtp vs icmp at DuckDuckGo
stackoverflow.com/questions/10344699/comparison-of-icmp-and-snmp-ping-in-terms-of-traffic
MVVM with Clean Architecture: Android Apps that Scale | Toptal
shodan vs censys at DuckDuckGo
how to list mounted devices in linux at DuckDuckGo
The Raspberry Pi Beginner's Guide is out now (and it's huge!) - Raspberry Pi
How to Write Your First Node.js App in Linux
How to Install PM2 to Run Node.js Apps on Production Server
Warning! Unprivileged Linux Users With UID > INT_MAX Can Execute Any Command
polymorphism cost c++ vs c at DuckDuckGo
cost comparison of run-time polymorphism in c++ vs java - Stack Overflow
stackoverflow.com/questions/10167094/cost-of-polymorphic-calls-c
dynamic binding compile time c++ at DuckDuckGo
stackoverflow.com/questions/22066647/what-is-the-difference-between-compile-time-polymorphism-and-static-binding
stackoverflow.com/questions/737567/dynamic-binding-in-c
dynamic dispatch at compile time - Google Search
stackoverflow.com/questions/7464889/interface-paradigm-performance-dynamic-binding-vs-generic-programming
stackoverflow.com/questions/2128838/compile-time-polymorphism-and-runtime-polymorphism
why is dynamic binding not performed at compile time - Google Search
softwareengineering.stackexchange.com/questions/200115/what-is-early-and-late-binding
stackoverflow.com/questions/18035293/what-is-early-static-and-late-dynamic-binding-in-c
stackoverflow.com/questions/32422923/why-does-java-bind-variables-at-compile-time
jvm - Java dynamic binding: Why the compiler cannot distinguish overriden methods - Stack Overflow
stackoverflow.com/questions/3375876/c-dynamic-binding
stackoverflow.com/questions/17250236/difference-between-dynamic-loading-and-dynamic-binding/17250349#17250349
c vs c++ performance at DuckDuckGo
stackoverflow.com/questions/6955114/is-c-notably-faster-than-c
stackoverflow.com/questions/2513741/c-vs-c-for-performance-in-memory-allocation
When to use C over C++, and C++ over C? - Software Engineering Stack Exchange
ed editor at DuckDuckGo
emacs diff patch feature at DuckDuckGo
emacs.stackexchange.com/questions/19721/how-to-create-a-patch-git-diff-with-a-specific-name
double vs float c c++ at DuckDuckGo
c++ - What is the difference between float and double? - Stack Overflow
c - 'float' vs. 'double' precision - Stack Overflow
stackoverflow.com/questions/3580389/c-c-sharp-differences-with-float-and-double
stackoverflow.com/questions/39900952/is-stof-strtof-deterministic
c++ - What is the meaning of numeric_limits<double>::digits10 - Stack Overflow
stackoverflow.com/questions/39917843/what-is-the-difference-between-github-flow-and-gitlab-flow
askubuntu.com/questions/249887/gconf-dconf-gsettings-and-the-relationship-between-them
c# - What is a PDB file? - Stack Overflow
reverseengineering.stackexchange.com/questions/20004/ollydbg-vs-x64dbg-is-there-anything-in-ollydbg-that-is-not-available-in-x64dbg
linux - How to expose a UNIX domain socket directly over TCP - Server Fault
listen on socket on bridge address linux at DuckDuckGo
ukrainian power grid hack at DuckDuckGo
wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/
dbus vs socket at DuckDuckGo
Message Queue vs Message Bus -- what are the differences? - Stack Overflow
GitHub - byt3bl33d3r/DeathStar: Automate getting Domain Admin using Empire
en.wikipedia.org/wiki/Vehicle_bus
i read book orthogonal what does mean site:stackoverflow.com - Google Search
stackoverflow.com/questions/1527393/what-is-orthogonality
en.wikipedia.org/wiki/Orthogonal_instruction_set
en.m.wikipedia.org/wiki/Data-rate_units
endpoint vs socket at DuckDuckGo
stackoverflow.com/questions/47488910/whats-the-difference-between-endpoint-and-socket
google bombing at DuckDuckGo
toptal.com/ios/rxswift-animations-ios?utm_campaign=Toptal%20Engineering%20Blog&utm_source=hs_email&utm_medium=email&utm_content=68034530&_hsenc=p2ANqtz-9o1gN263Qjsstgb3vxxUM6MI6aq-_2BcHgT-AVyrvM3ZJGuzkLXAWvOejFJo3mid7b_Iqf3h1bxjKRFRim5VnLNXtWZQ&_hsmi=68034530
toptal.com/f-sharp/f-sharp-tutorial-pt1?utm_campaign=Toptal%20Engineering%20Blog&utm_source=hs_email&utm_medium=email&utm_content=68299912&_hsenc=p2ANqtz-87v9Vj7qF7p27D-_rterLq4OCjz1IFZ5caXbbSXKtwdsGGVxHMhV3ve0DB_rMpDPDcb5nGL-T_GgnXigghgemkLEgAnw&_hsmi=68299912
movies.stackexchange.com/questions/8674/why-is-gandalf-referred-to-as-mithrandir
stackoverflow.com/questions/16668946/converting-gps-coordinates-into-3d-model
google maps - How to get geo coordinates of road? - Stack Overflow
stackoverflow.com/questions/3588653/convert-gps-coordinates-to-coordinate-plane
mathforum.org/library/drmath/view/51832.html
stackoverflow.com/questions/2870166/translate-gps-coordinates-to-location-on-pdf-map
3d model from gos coordinates github at DuckDuckGo
en.wikipedia.org/wiki/PfSense
soc vs soc 2 security at DuckDuckGo
vulnerability database at DuckDuckGo
en.m.wikipedia.org/wiki/Vulnerability_database
realisic fighting anime at DuckDuckGo
what communication bus is used in airplanes at DuckDuckGo
Nucleus RTOS - Wikipedia
Man arrested for stealing $1m from Silicon Valley Exec via SIM-swapping
Stan Hanks's answer to Is there any possible way to hack into my neighbor's Wi-Fi without them knowing? - Quora
Visualizing bits and qubits – Qiskit – Medium
Popular Dark Web hosting provider got hacked, 6,500 sites down | ZDNet
df command wiki at DuckDuckGo
vulcan api at DuckDuckGo
wiresgark detect malformed protocol at DuckDuckGo
Protocols/malformed - The Wireshark Wiki
magic packet wireshark at DuckDuckGo
Maximum transmission unit - Wikipedia
lib rpc unix at DuckDuckGo
json rpc at DuckDuckGo
is 4 digits payment card code secure enough at DuckDuckGo
tcp reset flag at DuckDuckGo
pkill vs kill command at DuckDuckGo
Mikhail Rozhkov's answer to Are consoles computers? - Quora
Coliru Viewer
pdb file at DuckDuckGo
shell code radare2 - Google Search
open tcp socket communication c at DuckDuckGo
socket vs pipe at DuckDuckGo
Differences between TCP sockets and web sockets, one more time - Stack Overflow
What do the numbers in a man page mean? - Unix & Linux Stack Exchange
routing tables at DuckDuckGo
Sockets Tutorial
c++ - Why does the order in which libraries are linked sometimes cause errors in GCC? - Stack Overflow
c++ - Difference between shared objects (.so), static libraries (.a), and DLL's (.so)? - dlopen, dlsym - windows vs linux
Shared Libraries: Understanding Dynamic Loading
Dynamic Shared Object equivalent on windows - Stack Overflow
usr lib vs usr local lib at DuckDuckGo
Differences between the many lib folders in Linux - Super User
c++ - boost.asio linking and libraries - Stack Overflow
nm (Unix) - Wikipedia
command line - What is the shortcut to move between two Terminator tabs? - Ask Ubuntu
c++ - Boost.asio server-client. Connect between 2 computers - Stack Overflow
c++ - What is the difference between asio::tcp::socket's async_read_some and async_receive? - Stack Overflow
async read vs c poll - Google Search
A guide to getting started with boost::asio - They don't teach this stuff in school - GameDev.net
How to asynchronously read to std::string using Boost::asio? - Stack Overflow
c++ - Boost.Asio: The difference between async_read and async_receive - Stack Overflow
std size_t vs size_t at DuckDuckGo
c++ - What to do with size_t vs. std::size_t? - Stack Overflow
c++ - How do all the different size types relate to each other? - Stack Overflow
cout write vs cout insertion operator at DuckDuckGo
std write vs c write - Google Search
put else if after return - Google Search
for ever vs while 1 at DuckDuckGo
qt obfuscator at DuckDuckGo
Operator Overloading, C++ FAQ
std::perror - cppreference.com
chained assignment c at DuckDuckGo
implementation of boost asio basic socket at DuckDuckGo
Socket Programming in C++ using boost.asio: TCP Server and Client - CodeProject
Cours de Réseau d'Edouard Thiel
Cours d'Unix d'Edouard Thiel
Turn Off Siri on Your Lock Screen for Better iOS Security | WIRED
How to Use Udev for Device Detection and Management in Linux
Sheepl - Creating Realistic User Behaviour For Supporting Tradecraft Development Within Lab Environments - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
GCHQ warns on Black Friday cyber-threat - BBC News
How Just Opening A Site In Safari Could Have Hacked Your Apple macOS
Getting started with Jenkins X | Opensource.com
Real Identity of Hacker Who Sold LinkedIn, Dropbox Databases Revealed
5 New Nonlethal Weapons the Defense Department Is Developing | WIRED
ACHE - A Web Crawler For Domain-Specific Search - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
How do we handle and use such enormous amounts of data? | Opensource.com
Two TalkTalk hackers jailed for 2015 data breach that cost it £77 million
Instagram Accidentally Exposed Some Users' Passwords In Plaintext
Acunetix Vulnerability Scanner Version For Linux - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Using Airport and Hotel Wi-Fi Is Much Safer Than It Used to Be | WIRED
uint8_t vs unsigned char at DuckDuckGo
c - uint8_t vs unsigned char - Stack Overflow
coding style - Is using assert() in C++ bad practice? - Stack Overflow
assert - When should assertions stay in production code? vs unit tests
java - Should UDP & TCP port numbers represented as a short or integer? - Software Engineering Stack Exchange
c++ - boost::asio::ip::tcp::socket is connected? - Stack Overflow
c - concatenating strings in a printf statement - Stack Overflow
assert performance c c++ at DuckDuckGo
c++ - When is uint8_t ≠ unsigned char? - Stack Overflow
c++ - Global scope vs global namespace - Stack Overflow
code port number on uint16 - Google Search
global namespace c++ at DuckDuckGo
Regarding the global namespace in C++ - Stack Overflow
c - cast unsigned char * (uint8_t *) to const char * - Stack Overflow
Set-top box - Wikipedia
What are the differences between gconf and dconf? - Ask Ubuntu
gnome - Automatic suspend - "Computer will suspend very soon because of inactivity" - how can I disable this? - Ask Ubuntu
How to permanently disable sleep/suspend? - Ask Ubuntu
power management - How do I disable my system from going to sleep? - Ask Ubuntu
Linux disable screen blanking i.e. preventing screen going blank - nixCraft
power management - Disable suspend/sleep mode completely on Fedora 21 - Unix & Linux Stack Exchange
linux - What's the difference between xorg.conf, xset and xinput set? - Stack Overflow
Setting nautilus-open-terminal to launch Terminator rather than gnome-terminal - Ask Ubuntu
linux - Add a custom option in Nautilus right click menu - Stack Overflow
c++ - #pragma once vs include guards? - Stack Overflow
Circular dependency - Wikipedia
https://duckduckgo.com/?q=monero+vs+zcash&t=ffab&ia=web
HijackThis - Wikipedia
A stack-based buffer overflow vulnerability and exploit tutorial using Linux opensource, C and assembly code with real experimental demonstration in the controlled environment
FBI and NSA expose Russian State hacking tool for Linux systems - cyberwarfare
Hackers actively exploiting unfixed flaws in VPNs, Microsoft servers - CISA - cyberwarfare
sage x3 server - Recherche Google
Gopher (protocol) - Wikipedia
lotus domino - Recherche Google
View list of files in ZIP archive on Linux - Super User
linux - Do I need ntpd on a LAMP server? - Server Fault
libraries - What is the advantage of archiving C object files in a static library (.a file)? - thin archive
tar (computing) - Wikipedia
zip - Extract only a specific file from a zipped archive to a given directory - Unix & Linux Stack Exchange
How do I check if a package is installed on my server? - Ask Ubuntu
command line - What do the various dpkg flags like 'ii' 'rc' mean? apt package states/status meanings - dpkg-query manual - Ask Ubuntu
ip - Do machines connected to the same switch belong to the same subnet? - Super User
Switch configuration: step-by-step plan – ICTS
Configuring the Switch for the First Time -- supcfg.fm - supcfg.pdf
swint.mif - swint.pdf
How to configure a VLAN on a NETGEAR managed switch | Answer | NETGEAR Support
linux - Two IP addresses on the same interface, find out which one is in use - Unix & Linux Stack Exchange
windows - List incoming connections on nc (netcat) - Super User
Netcat (nc) Command Tutorial With Examples - POFTUT
centos5 - How can I configure netcat (or some other stock linux utility) to listen on a specific port on a secondary IP address? - Server Fault
NetcatCheatSheet - netcat_cheat_sheet_v1.pdf
An Introduction to the ss Command | Linux.com | netstat obsolete -- The source for Linux information
linux - Netcat IP Spoofing - Information Security Stack Exchange
ZeroMQ - Wikipedia -- dds-like
Comparing OpenDDS and ZeroMQ Usage and Performance | OCI
Data Distribution Service - DDS - publish–subscribe pattern
POCO C++ Libraries - Wikipedia
My 'USB flash' does not have write permission. I can't copy files into it via Nautilus? - Ask Ubuntu
How to edit label of USB drive? - Ask Ubuntu
disk - How do I rename a USB drive? - Ask Ubuntu
string - How to use sed/grep to extract text between two words? - Stack Overflow
Non greedy (reluctant) regex matching in sed? - Stack Overflow
Can I purge configuration files after I've removed the package? - Ask Ubuntu
What characters do I need to escape when using sed in a sh script? - Unix & Linux Stack Exchange
bash - How to change the output color of echo in Linux - Stack Overflow
Chapter 31. Boost.PropertyTree - 1.65.1 - serialization
How to Setup DHCP Server and Client on CentOS and Ubuntu
Speeding Up The Traveling Salesman Using Dynamic Programming
Quora Gets Hacked – 100 Million Users Data Stolen
Old and new OpenSSH backdoors threaten Linux servers - Help Net Security
protonmail.com/blog/australia-anti-encryption-law/
how-to-optimize-c-and-cpp-code-in-2018
SNDBOX: AI-Powered Online Automated Malware Analysis Platform
Someone Hacked 50,000 Printers to Promote PewDiePie YouTube Channel
The Marriott Hack: How to Protect Yourself | WIRED
Kbd-Audio - Tools For Capturing And Analysing Keyboard Input Paired With Microphone Capture - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
500 Million Marriott Guest Records Stolen in Starwood Data Breach
hackread.com/gang-jailed-for-installing-card-skimmers-on-gas-pumps/
driver-loses-his-car-to-hackers-twice
why-you-should-use-a-vpn-on-a-public-wi-fi-network
Breaking And Improving Protocol Obfuscation
How to copy text from PowerShell - Super User
The Command Line in Windows: Managing Windows Services with the Service Controller (sc)
networking - How can you find out which process is listening on a port on Windows? - Stack Overflow
Fiddler - tunnelled http requests to port 443 - Stack Overflow
How to debug websockets with wireshark - Stack Overflow
networking - How to debug Websockets? - Stack Overflow
How to capture HTTP traffic using Wireshark or Fiddler - Atlassian Documentation
Fiddler Options UI
Fiddler SessionFlags
Examine Web Traffic - Progress Telerik Fiddler
View Web Traffic - Progress Telerik Fiddler
CodeFromThe70s.org
PHP/Curl monitoring using Fiddler - Stack Overflow
C++ - Why set object to null after deleting? - Stack Overflow
c++ - Is it good practice to NULL a pointer after deleting it? - Stack Overflow
c++ - Pointer not getting set to nullptr after delete - Stack Overflow
c++ - Do I have to set pointer to nullptr in destructor? - Stack Overflow
c++ - Is it safe to delete a NULL pointer? - Stack Overflow
c++ - Why doesn't delete set the pointer to NULL? - Stack Overflow
delete expression - cppreference.com
C++/CLI - Wikipedia
how does c++ cli work at DuckDuckGo
c++ managed pointer at DuckDuckGo
.net - What is gcnew? - Stack Overflow
C++ Tip: Use STL copy, Not memcpy to Copy Array - CodeProject
What is the memcpy equivalent in C++ - Stack Overflow
Alternative to memcpy in C++? - General and Gameplay Programming - GameDev.net
std::memcpy - cppreference.com
c - What is the difference between memmove and memcpy? - Stack Overflow
memset, memcpy, memcmp, and memmove — Embedded Artistry
The memcpy vs. memmove saga
Memcpy vs. memmove | Hacker News
V743. The memory areas must not overlap. Use 'memmove' function.
CppCoreGuidelines/CppCoreGuidelines.md at master · isocpp/CppCoreGuidelines · GitHub
return enum or underlying type c++ - Recherche Google
C++ Core Guidelines: Rules for Enumerations - ModernesCpp.com
enum class comparison c++ - Recherche Google
cast underlying type to enum class - Recherche Google
nested class c++ - Recherche Google
Nested Classes in C++ - GeeksforGeeks
elaborated type specifier for a scoped enum must not use class keyword - Recherche Google
c++ - Elaborated-type-specifier for a scoped enum must not use the ‘class’ keyword - Stack Overflow
size_t cppref - Recherche Google
std::size_t - cppreference.com
'printf' vs. 'cout' in C++ - Stack Overflow
priu32 - Google Search
What is unquoted `PRIu32` in printf in C? - Stack Overflow
rename branch locally and remotely git - Google Search
Rename a Git branch locally and remotely? - Stack Overflow
vim delete to underscore - Google Search
How do I get Vim to treat underscores in a string as a word break? - Stack Overflow
cursor motions - How to treat underscores like space? - Vi and Vim Stack Exchange
git roll back commit - Google Search
lookup previous code version before commit git - Google Search
add all unstaged and untracked files git - Google Search
git add - Git add all files modified, deleted, and untracked? - Stack Overflow
git add - Difference between "git add -A" and "git add ." - Stack Overflow
git working tree - Google Search
Git Workflow | Backlog
What is the Working Tree in Git? - Mijingo
version control - What's the difference between HEAD, working tree and index, in Git? - Stack Overflow
how to define static constexpr member variable c++ - Google Search
c++ - What's the difference between static constexpr and static inline variables in C++17? - Stack Overflow
inline variables - Google Search
c++ - How do inline variables work? - Stack Overflow
external linkage meaning - Google Search
c++ - What is external linkage and internal linkage? - Stack Overflow
Linkage (software) - Wikipedia
DCL36-C. Do not declare an identifier with conflicting linkage classifications - SEI CERT C Coding Standard - Confluence
Inline Variables - 7 Features of C++17 that will simplify your code
C++ where to initialize static const - Stack Overflow
integral type - Google Search
std::is_integral - cppreference.com
link between system calls and drivers - Google Search
hardware - How exactly does a program talk to a device driver? - Software Engineering Stack Exchange
does a user program always use system calls to access a device driver - Unix & Linux Stack Exchange
Lec 11: User Space, Kernel Space, and the System Call API - sbrk(), malloc() - kernel traps - manpage section 2 relates to system call wrappers
dynamic loading c stack overflow - Google Search
Dynamically Loaded (DL) Libraries
[C++] Dynamic Loading of Shared Objects at Runtime - Programming - dso - 0x00sec - The Home of the Hacker
Chapter 3. Using Dynamic Shared Objects - DSOs
linux - Dynamic loading in C - Stack Overflow
Performance c++: Dynamic loading library and loops - Stack Overflow
c++ - Dynamic Loading Without extern "C" - Stack Overflow
How to design a C++ program to allow for runtime import of functions? - Software Engineering Stack Exchange
operating systems - Difference between dynamic loading and dynamic linking in the OS - Computer Science Stack Exchange
basic_stream_socket::read_some (1 of 2 overloads) - 1.36.0
c - sscanf handles maximal unsigned integer value differently than assignment does - scanf family vs strto family - Stack Overflow
systemd - systemctl status shows : "State: degraded" - Unix & Linux Stack Exchange
assign const pointer to non const - Google Search
c++ - const pointer assign to a pointer - Stack Overflow
naming convention local variables c++ - Google Search
Variable Naming Conventions in C++ - Stack Overflow
Making Wrong Code Look Wrong – Joel on Software
reload bashrc while in terminal session - Google Search
bash - How do I reload .bashrc without logging out and back in? - Stack Overflow
winrt vs cli - Google Search
windows 8 - What are C++/CX and C++/CLI, and how do they relate to C++ and WinRT? - Software Engineering Stack Exchange
Differences between C++/CLI and WinRT C++
visual c++ - Universal Windows Platform Apps and C++/CLI (VS 2015 RC1) - Stack Overflow
getmin and max eunm type values c++ - Google Search
std::numeric_limits - cppreference.com
c++ - Can an enum class be converted to the underlying type? - Stack Overflow
typedef vs using - Google Search
c++ - What is the difference between 'typedef' and 'using' in C++11? - Stack Overflow
c++ - arrow operator (->) in function heading - Stack Overflow
decltype vs auto c++ - Google Search
c++ - decltype vs auto - Stack Overflow
Type Inference in C++ (auto and decltype) - GeeksforGeeks
auto specifier (since C++11) - cppreference.com
uninitialized global variables c++ - Google Search
Uninitialized variable - Wikipedia
initialization - What happens to a declared, uninitialized variable in C? Does it have a value? - Stack Overflow
The uninitialized variable anathema: non-deterministic C++ – Musing Mortoray
initialize braces vs parentheses - Google Search
c++ - Why is list initialization (using curly braces) better than the alternatives? - Stack Overflow
memet brace initialisation list c++ - Google Search
aggregate initialization - cppreference.com
list initialization (since C++11) - cppreference.com
why is it impossible to define template method in source file - Google Search
Storing C++ template function definitions in a .CPP file - Stack Overflow
Standard C++
Function template - cppreference.com
How to define a template class in a .h file and implement it in a .cpp file - CodeProject
separate compilation model - Google Search
compilation unit vs cpp file - Google Search
class template vs templat class - Google Search
c++ - What is the difference between a template class and a class template? - Stack Overflow
celeron vs i7 - Google Search
Microsoft bans memcpy | Unspecified Behaviour - memcpy_s
C++ - memcpy, memmove, and memset are obsolete! « Modern Maintainable Code
memcopy, memmove, and Speed over Safety « Vincent Gable’s Blog
Microsoft Bans Memcopy() - Schneier on Security
appsec - Secure memcpy for pure C - stash smashing, heap corruption - malloc, free - string literal modification
c - How to prevent memcpy buffer overflow? - Stack Overflow
c - Is it safe to use memcpy like this? - restrict keyword
Is memcpy unsafe? - Stack Overflow
linux - Not being able to start lightdm - Super User
journalctl vs var log - Google Search
understanding linux logging - Google Search
crash kernel linux driver development - Google Search
CRASH Your System (and Debug Kernel Panic) - Open Source For You
crash kernel vs kernel panic - Google Search
Re: Extract one file from .deb?
erase history command linux - Google Search
How to delete a single command from history on a Linux/Unix Bash shell - nixCraft
how to force shell not to remember command - Google Search
linux - Execute command without keeping it in history - Stack Overflow
bash - Temporarily suspend bash_history on a given shell? - Unix & Linux Stack Exchange
Restricted Linux Shell Escaping Techniques | FireShell Security Team
boot inird.img - Google Search
initramds-tools - Google Search
loaded vs active vs running systemctl - Google Search
systemd - Differences between inactive vs disabled and active vs enabled services - Unix & Linux Stack Exchange
linux - All systemd states - Super User
cannot disable service systemctl - Google Search
How To Use Systemctl to Manage Systemd Services and Units | DigitalOcean
linux - Cannot disable systemd service - Stack Overflow
systemd - How to disable a service without using 'systemctl disable' - Unix & Linux Stack Exchange
shutdown vs poweroff vs halt linux - Google Search
linux - What's the difference between poweroff and halt? - Unix & Linux Stack Exchange
Is halt the same as "shutdown -H" and poweroff the same as "shutdown -P"? - Unix & Linux Stack Exchange
Understanding Shutdown, Poweroff, Halt and Reboot Commands in Linux
What is the difference between shutdown and poweroff commands? - Ask Ubuntu
xclip vs xclipboard - Google Search
w10 iot vs pro - Google Search
Overview of Windows 10 IoT Enterprise - Windows IoT | Microsoft Docs
Advantages of Windows 10 IoT Ent LTSB over Win 10 Pro | Steatite Embedded
Windows 10 editions - Wikipedia
What’s the Difference Between Windows 10 IoT Versions?
shell - awk command to extract string after a specific pattern string - Stack Overflow
postint script deb pakcage - Google Search
Chapter 5. Other files under the debian directory
The Debian GNU/Linux FAQ - Basics of the Debian package management system
meaning control .tar.xz - Google Search
DashAsBinSh - Ubuntu Wiki
change user from script bash - Google Search
Changing user in a script? - Unix & Linux Stack Exchange
syslog linux - Google Search
syslog - Understand logging in Linux - Unix & Linux Stack Exchange
Yet another talk on bug bounty
Nmap and Nikto 101 at Null
Metasploit framwork
API Security - Null meet
A Strategic Path from Secure Code Reviews to Threat Modeling (101)
Nmap and metasploitable
gcnew at DuckDuckGo
what exactly happens when one exports a variable in shell unix at DuckDuckGo
buffer vs array c - Google Search
have i been pwned - Why check your email in haveibeenpwned rather than regularly changing your password regardless of any leaks? - Information Security Stack Exchange
Changes in Password Best Practices - Schneier on Security
Security Vulnerabilities in US Weapons Systems - cyberwarfare - Schneier on Security
Troy Hunt on Passwords - Schneier on Security
Yet Another IoT Cybersecurity Document - Schneier on Security
AES Resulted in a $250-Billion Economic Benefit - Schneier on Security
How can I get the name of the current terminal from command-line? - Ask Ubuntu
bash - In the shell, what does " 2>&1 " mean? - VS 2>1file descriptor redirections in shell - Stack Overflow
Communication protocol - Wikipedia
Utilisation de xrandr
Changing X11 resolution on the fly
ethernet - Network Byte Order - Network Engineering Stack Exchange
Direct Rendering Manager - crtc definition among others - Wikipedia
ps (Unix) command - process status - GetProcess in Windows PowerShell
pstree - Wikipedia
rxvt-unicode - urxvt - ArchWiki
evdev - Wikipedia
A Practical Guide to Nmap (Network Security Scanner) in Kali Linux
strace - Wikipedia
SystemTap - Wikipedia
perf (Linux) - Wikipedia
ftrace - tracing framework for linux kernel - Wikipedia
Tracing (software) - Wikipedia
truss (Unix) - Wikipedia
lsof - Wikipedia
Using traps in your scripts
wireless - Does pressing a car remote many times offer denial of service attack for rolling codes? - Information Security Stack Exchange
The Linux Documentation Project: Guides
Advanced Bash-Scripting Guide
Traps in Unix shell
Rootkit - Wikipedia
malware - Has it been mathematically proven that antivirus can't detect all viruses? - Information Security Stack Exchange
Cron - Wikipedia
How to create a message box from the command line? - Unix & Linux Stack Exchange
How to show a GUI message box from a bash script in linux? - Stack Overflow
bash - self-deleting shell script - Stack Overflow
shred (Unix) - Wikipedia
utf 8 - What is the difference between UTF-8 and ISO-8859-1? - Stack Overflow
ISO/IEC 8859-1 - Wikipedia
Universal Coded Character Set - Wikipedia
ISO/IEC JTC 1/SC 2 - Character Sets and Information Coding - Wikipedia
Digraphs and trigraphs - Wikipedia
utf 8 - What is the advantage of choosing ASCII encoding over UTF-8? - Software Engineering Stack Exchange
Parity bit - Wikipedia
What Every Programmer Absolutely, Positively Needs to Know About Encodings and Character Sets to Work With Text - ascii, unicode, utf - definitive
Late Night Java by Koray Tugay: What is ASCII and Unicode and a Character Set and this and that and Encoding and a Character...
What is the difference between Morse code and binary? - Quora
Is Morse Code the same concept as binary programming? - Quora
information theory - Is Morse Code binary, ternary or quinary? - Computer Science Stack Exchange
If Morse is more efficient than binary, why don't we use Morse? : askscience
What separates words in Morse code? What's the difference between a separation dash and T? - Quora
how to distinguish space between letters and words in morse at DuckDuckGo
12-bit - 12bit-width cpus - PDP 8
Precision (computer science) - Wikipedia
How Unix Implements Passwords - password hashing - /etc/passwd file - crypt(3) - Practical UNIX and Internet Security, 3rd Edition [Book]
github - git - remote add origin vs remote set-url origin - Stack Overflow
How To Edit the Sudoers File on Ubuntu and CentOS - definitive guide, sudoers syntax, sudoers.d files, NOPASSWD, NOEXEC, sudo -k to clear keyring timer - change default editor visudo | DigitalOcean
security - What is the least insecure way to store a password that is used by a script? - Ask Ubuntu
security - Hide/encrypt password in bash file to stop accidentally seeing it - Stack Overflow
How to securely store credentials in a bash variables? - Information Security Stack Exchange
security - Hiding Password in Shell Scripts - Unix & Linux Stack Exchange
linux - How to pass the password to su/sudo/ssh without overriding the TTY? - Stack Overflow
permissions - How do I use su to execute the rest of the bash script as that user? - Stack Overflow
scripting - change user within bash script - Server Fault
Application-to-Application Password Management - Password Manager Pro
Application Password Management and Credential Control | CyberArk
CyberArk - digital/network vaults Wikipedia
Public key infrastructure - PKI- Wikipedia
Server credential management for Linux and Windows - Server Fault
encryption - Password Vault - Enterprise - Information Security Stack Exchange
encryption - Hardware-Based Password Manager - Information Security Stack Exchange
Ubuntu 16.04 - system boot waits saying "Raise network interfaces" - dhclient issue - Ask Ubuntu
Linux dhclient command help and examples
Dhclient Configuration Examples @ Calomel.org
How to make a Linux File unchangeable ( unalterable ) so that no one can modify it - nixCraft
What is the difference between chmod and chattr? - Ask Ubuntu
linux - What' the differences between `chattr +i FILE` and `chmod -w FILE`? - Stack Overflow
network scanners - honeypot - Does a fake SSH server have any purpose security-wise? - Information Security Stack Exchange
bash - Should I use sudo in a script or sudo an entire script? - NOPASSWD - Super User
The Right Way to Use sudo in Scripts - passwd, sudoers | Ming's Blog
command line - What does outputting to /dev/null accomplish in bash scripts? - Ask Ubuntu
Step by step breakdown of /dev/null – Jorge Yau – Medium
shell - What is /dev/null 2>&1? - Stack Overflow
command line - What does 2>/dev/null mean? - Ask Ubuntu
bash - What does "< /dev/null" mean? - Unix & Linux Stack Exchange
Sending data into the void with /dev/null | Network World
Bash One-Liners Explained, Part III: All about redirections
stdout - What does > /dev/null 2>&1 || true mean in Linux? - Super User
Null device - Wikipedia
networking - how to fix " a start job is running for the raise network " in ubuntu server >= 16.0 LTS Ask Ubuntu
debian - What is a hotplug event from the interface? - Unix & Linux Stack Exchange
Chapter 5. Network setup
Debian Reference
Does a Gateway of a Subnet need to be a "real" Computer? - Server Fault
linux - Complete wiping of hard drive - shred, wipe or dd? secure deletion - Super User
Journaling file system - Wikipedia
overwrite data in journal - Google Search
Why overwriting is not enough to erase data
File system journal forensics - secure deletion
network manager - Have to run sudo dhclient eth0 automatically every boot - dhclient issue - Ask Ubuntu
networking - How to automate running the dhclient in ubuntu? - dhclient issue -Super User
Linux Make Sure /etc/resolv.conf Never Get Updated By DHCP Client - nixCraft
hardware - How secure is a BIOS/UEFI hard drive password? - Information Security Stack Exchange
hardware - What use does a BIOS/EFI password have? - Information Security Stack Exchange
linux - What is the difference between "#!/usr/bin/env bash" and "#!/usr/bin/bash"? - code injection possibilities with /usr/bin/env bash - shebang - Stack Overflow
shell script - Why is it better to use "#!/usr/bin/env NAME" instead of "#!/path/to/NAME" as my shebang? - Unix & Linux Stack Exchange
GitHub - blunden/haveibeenpwned: Android app frontend to the "Have I been pwned?" service.
how to run cron jobs as a specific user other than root in linux – lost saloon
Run commands - rc - Wikipedia
When it's Ok and Not Ok to use rc.local | init scripts, firewall ip tables
linux - Crontab vs init.d (rc.local) which one to use for Startup Script? - Server Fault
What runs first rc.local or cron @reboot? : linux
Linkers and Loaders book - errata and code - John R Levine
Compilerx - Compiler.pdf
text, data and bss: Code and Data Size Explained - Flash memory | MCU on Eclipse
Special sections in Linux binaries [LWN.net]
linking.pdf from elf to process, loading, .o object files linking, executable generation
CS161: OS Operating System Course Syllabus (Spring 2017)
CS161: OS Operating System Course Slides (Spring 2017), ffs-recovery, fork-exec, filesystem, journaling, lfs, state-transition, switching, syncrhonization
linux - about fork and execve system call - Stack Overflow
Why polkit (or, how to mount a disk on modern Linux) vs MAC (selinux, apparmor ...)
Security Features - Fedora Linux Hardening - fde, virtualization, sandboxing, nx, pie, fortify_source, elf hardening, selinux, polkit, Fedora Project Wiki
Disk Encryption User Guide - dm-crypt/LUKS, block device encryption, /etc/crypttab, Fedora Project Wiki
SecurityBasics - Fedora Project Wiki
polkit- authorization manager
Writing polkit applications: polkit, DBUS, pkcheck Reference Manual
PolicyKit Authentication Framework: Creating Your Own Rules | Learning Tree Blog
Polkit - ArchWiki - Authorization Framework
Configure Xauthority - xhost, display env var,
6 Reasons Your cron Job is Not Running -
HOWTO: Setting up secure access to your X display
Xorg - ArchWiki
Clipboard - ArchWiki xclip
Guide to X11/Introduction - Wikibooks, open books for an open world
X11vnc - ArchWiki - xauthority
JUST AIX: Create/rebuild a new .Xauthority file
A command to list all users? And how to add, delete, modify users? - getent - Ask Ubuntu
linux - How do I edit /etc/sudoers from a script? - Stack Overflow
bash - In the shell, what does " 2>&1 " mean? - Stack Overflow
linux - Redirect all output to file - Stack Overflow
linux - How can I fully log all bash scripts actions? - Server Fault
server - Can't SSH in as root - PermitRootLogin /etc/ssh/sshd_config - Ask Ubuntu
alu - What was the main purpose of bitshift instructions in CPU? - Retrocomputing Stack Exchange- bitwise operation history
Executing Commands and Scripts at Reboot & Startup in Linux - LinuxTechLab
tls - Is it something to worry about when my browser warns me that my connection to 192.168.1.1 (router admin page) is not secure? - home router security - Information Security Stack Exchange
How do I change my default browser? - Ask Ubuntu
MIME - Multipurpose Internet Mail Extension - Wikipedia
S/MIME - Secure Multupurpose Internet Mail Extension - Wikipedia
Malware vs Viruses: What's the Difference?
Difference Between Malware and Virus - DifferenceBetween.com
What Is the Difference: Viruses, Worms, Trojans, and Bots? - Cisco
What's the difference between antivirus and anti-malware? | Malwarebytes Labs
Virus or Malware - Malwarebytes Labs | Malwarebytes Labs
The Facts about Botnets - Malwarebytes Labs | Malwarebytes Labs
Malware vs. Viruses – detection techniques - Signature-based scanning, Heuristic analysis, Real-Time Behaioral monitoring, Sandbox analysis - What’s the Difference? | McAfee
What is the difference between virus and malware? - Quora
malware - Biological viruses analogy - How is a worm different from a virus? - Information Security Stack Exchange
Malware - Risk Naming Conventions | Symantec
shell - Scripts in rc.local (start at boot), doesnot start - Unix & Linux Stack Exchange
Warning! This Cross-Platform Malware Can Hack Windows, Linux and OS X Computers
Linux malware - Wikipedia
Multi-Platform Proof of Concept Virus Clapzok.A Examined | The Mac Security Blog
The Rise of Multi-Platform Malware
Unpacking Packed Malware - Security Now
Java Malware Becomes a Cross-Platform Threat
Brazilian underground is spreading cross-platform malwareSecurity Affairs
New Cross-platform Malware Attacks Both Windows and Mac OS X Computers – The Merkle Hash
Multi-platform backdoor malware targets Windows, Mac and Linux users – Naked Security
W32.Peelf.2132 - Cross-platform binary file - | Symantec
virus - Can viruses be transfered across incompatible architectures? - Information Security Stack Exchange
malware - Where can I find information on existing viruses? - Information Security Stack Exchange
More Multi-Architecture IoT Malware - SANS Internet Storm Center
IoTPOT: A Novel Honeypot for Revealing Current IoT Threats
Malware Sample Sources for Researchers
Home - AVCaesar
Operating Systems are Meaningless to Malware Developers | The Mac Security Blog
Linux malware - Wikipedia
Why is Windows more vulnerable than Linux? - Quora
Why is windows more prone to viruses than linux? - Super User
security - How is Linux not prone to viruses, malware and those kinds of things? - Super User
operating systems - Why is Linux considered more secure than Windows? - Information Security Stack Exchange
Cross-platform Trojan checks your OS: Attacks Windows, Mac, Linux | ZDNet
Cross-platform malware exploits Java to attack PCs and Macs | ZDNet
Phoenix Singletons
c++ - Thread-safe Phoenix Singleton class template with Boost - Code Review Stack Exchange
Linux / UNIX Crontab File Location - nixCraft
Creating and Editing crontab Files (System Administration Guide, Volume 2)
shell - How do you use output redirection in combination with here-documents and cat? - Unix & Linux Stack Exchange
Evaluating the Cost of Atomic Operations onModern Architectures
What is the difference between a cache and a buffer? - Super User
Cache (computing) - Wikipedia
Prefetcher - part of the Windows Memory Manager -Wikipedia
readahead - system call page cache - Wikipedia
Page cache - side-channel attacks against the page cache, privilege separation -Wikipedia
atomic - Atomicity in C++ : Myth or Reality - Stack Overflow
memory - How do cache lines work? - Stack Overflow
CPU Caches and Why You Care - Meyers - pdf
Why are cache lines in modern processors typically much larger than the instruction size? - Quora
How do we determine if a processor is 8-bit; 16-bit or 32-bit - Stack Overflow
CPU bit-width, its cache line, the bus between memory and CPU, and its registers? - Computer Science Stack Exchange
multithreading - Are Reads and Writes of an int in C++ Atomic on x86-64 multi-core machine - Stack Overflow
c - CPU and Data alignment - Stack Overflow
Data Alignment when Migrating to 64-Bit Intel® Architecture | Intel® Software
c++ - Can compiler sometimes cache variable declared as volatile - concurrency - Stack Overflow
c++ - Atomicity on x86 - cache - Stack Overflow
java - What is the difference between atomic / volatile / synchronized? - Stack Overflow
Non-static member functions - const-, volatile and ref-qualified member functions - cppreference.com
DEFINITIVE - Can num++ be atomic for 'int num'? coherence vs atomicity, multithreading - C, C++
c++ - Concurrency: Atomic and volatile in C++11 memory model - Stack Overflow
c++ - Why is integer assignment on a naturally aligned variable atomic on x86? - Stack Overflow
Atomic vs. Non-Atomic Operations
multithreading - Does one assembler instruction always execute atomically? - Stack Overflow
What is an atomic operation? – Musing Mortoray
L25-Atomic-Operations-1.ppt - L25-Atomic-Operations.pdf
Compare-and-swap - atomic op, synchronization -Wikipedia
Linearizability - Atomicity - Wikipedia
std::atomic - cppreference.com
Volatile: Almost Useless for Multi-Threaded Programming | Intel® Software
volatile vs. atomic | Dr Dobb's - Herb Sutter
std::atomic vs. volatile | Jiawei Huang
c++ - Atomicity on x86 - Stack Overflow
c - How come INC instruction of x86 is not atomic? - Stack Overflow
c++ - Is increment an integer atomic in x86? - Stack Overflow
PSSI — Guide d’élaboration de politiques de sécurité des systèmes d’information | Agence nationale de la sécurité des systèmes d'information
Agence nationale de la sécurité des systèmes d'information
Prestataires de services de confiance qualifiés | Agence nationale de la sécurité des systèmes d'information - passi de l'ANSSI
Qualified Security Assessor - PCI QSA - Wikipedia
Payment card industry - PCI - Wikipedia
Payment Card Industry Security Standards Council - PCI SSC - Wikipedia
Payment gateway - Wikipedia
Payment system - Wikipedia
Payment processor - Wikipedia
Payment service provider - PSP - Wikipedia
Certification Supérieure de premier niveau - CSPN de l'ANSSI | Agence nationale de la sécurité des systèmes d'information
IBM Notes - Lotus Domino - Wikipedia
IBM Lotus Domino Administration 8.5.3 Training | Udemy
Integrating IBM Lotus Domino Directory with Microsoft Active Directory using ADSync
Setting up Domino Active Directory synchronization
Text over IP - ToIP, Voice Video Over IP - Wikipedia
Botnet - Command_and_control - Wikipedia
Blue team (computer security) - Wikipedia
Hardening (computing) - Wikipedia
Red Teaming vs Penetration Testing - What’s the Difference?
Penetration-RedTeam Whitepaper.pdf
Vulnerability Assessment, Penetration Testing and Red Teams Explained – TBG Security – Information Security Consulting
Is Red Team Testing More Effective Than Penetration Testing?
Red Team vs Pentest
Red Teaming vs. Penetration Testing, blue team | NuHarbor Security
Penetration Testing vs. Red Teaming: What’s the Difference? - RedTeam Security
Penetration Test vs. Red Team Assessment: The Age Old Debate of Pirates vs. Ninjas Continues
Cross Site Tracing - OWASP
CGI Vulnerabilities - Help Net Security
cgi vulnerabilities - Phrack Magazine
Common Gateway Interface - CGI - security stuffs
The Common Gateway Interface: Security
Windows API Hooking Tutorial (Example with DLL Injection)
windows - what is the difference between dll hooking and dll injection - Information Security Stack Exchange
windows - what is the difference between dll hijacking and dll injection - Information Security Stack Exchange
c++ - DLL Injection with CreateRemoteThread - Stack Overflow
Hooks - Windows applications | Microsoft Docs
API Hooking
Netfilter - Wikipedia
iptables - Wikipedia
Comparison of firewalls - Wikipedia
List of API Hook Libraries · kubo/funchook Wiki · GitHub
What is meant by the term "hook" in programming? - Stack Overflow
LoadLibraryA function | Microsoft Docs
windows - What is dll hijacking? - Stack Overflow
SetWindowsHookExA function | hooking - Microsoft Docs
API Hooking and DLL Injection on Windows
Function Hooking and Windows Dll Injection [CS Open CourseWare]
GitHub - David-Reguera-Garcia-Dreg/phook: Full DLL Hooking, phrack 65
Ten Process Injection Techniques: A Technical Survey of Common and Trending Process Injection Techniques | Endgame
Race_Condition.pdf - setuid
priviliged programs, /etc/shadow, principle of least privilege, suid/ Set-UID/Set-Root-UID - backdoor implanting through physical access - process environment variable
Web_Security.pdf
explicit specifier - cppreference.com
Artificial Intelligence: A Modern Approach
Table of Contents for AI: A Modern Approach
GitHub - klutometis/aima: Solutions to AIMA (Artificial Intelligence: A Modern Approach)
Network Information Service - NIS - Wikipedia
Network File System - NFS - Wikipedia - Alternative remote file access protocols include the Server Message Block (SMB, also termed CIFS), Apple Filing Protocol (AFP), NetWare Core Protocol (NCP), and OS/400 File Server file system (QFileSvr.400), SMB and NetWare Core Protocol (NCP) occur more often than NFS on systems running Microsoft Windows; AFP occurs more often than NFS in Apple Macintosh systems; and QFileSvr.400 occurs more often in AS/400 systems. Haiku in 2012 added NFSv4 support as part of a Google Summer of Code project.
Oracle WebLogic Server - Wikipedia
RSA SecurID - strong authentication - Wikipedia
Strong authentication - Wikipedia
LDAP Naming Service Versus Other Naming Services (System Administration Guide: Naming and Directory Services (DNS, NIS, and LDAP))
Mobile device management - MDM - Wikipedia
Fat client - Wikipedia
Thin client - Wikipedia
HID® ActivID® ActivClient® - strong authentication, smart card, usb token | HID Global
Security token - dongle - Wikipedia
Check Point VPN-1 - previously known as FW-1 - Wikipedia
Cisco PIX firewall - Wikipedia
Global Information Assurance Certification - giac - sans related security certifications - Wikipedia
GPEN vs OSCP? — TechExams Community
GIAC (GPEN) vs. OSCP : HowToHack
PwnDizzle: CEH vs OSCP vs GPEN
OSCP vs LPT (Licensed Penetration Tester Master): A Comparison by Someone with Both - definitive
GIAC GXPN Exploit Researcher and Advanced Penetration Tester Certification | Exploit Researcher | Advanced PenTesting
GIAC Penetration Tester GPEN Certification | Network Penetration Testing Certification
GIAC GPEN Certification - SANS institue
GIAC Penetration Tester (GPEN) Certification
GIAC Certifications Overview
My Journey Through the Offensive Security Certified Professional (OSCP) | #!/bin/blog
c++ - How does gdb read the register values of a program / process it's debugging? How are registers associated with a process? - ptrace API usage - vs strace - definitive answer - Stack Overflow
Playing with ptrace, Part I - linux/user.h, ORIG_EAX | Linux Journal
Writing Secure Shell Scripts - password secure storage and retrieval - classical trojan/backdoor attack | Linux Journal
Software protection dongle - Wikipedia
Microarchitecture -uarch - ISA implementation in a particualar processor - Wikipedia
Microsoft advances quantum computing vision and helps tackle real-world challenges - Microsoft Quantum
Flat Display Mounting Interface - fdmi, vesa Wikipedia
Video Electronics Standards Association - vesa - Wikipedia
util-linux package - Wikipedia
Universally unique identifier - uuid - Wikipedia
Changelog - Wikipedia
udev - userspace /dev - device manager for linux kernel - successor of devfsd and hotplug - Wikipedia
Intel Management Engine - IME - Wikipedia
Intel Active Management Technology - AMT - out-of-band management - backdoor - Wikipedia
Spectre (security vulnerability) - Wikipedia
Meltdown (security vulnerability) - Wikipedia
System call - standard library wrappers - glibc - unix example open, read, write, close, wait, exec, fork, exit, and kill, fork, execve - strace, ptrace, procfs - RISC, CISC implementation - CPU security ring - interrupts
CPU modes - CPU states, CPU privilege levels, relationship with protection ring - Wikipedia
Central processing unit - CPU - Wikipedia
Address space - Wikipedia
Framebuffer - framestore -
Device file - special file - device node - character/block devies - pseudo-devices /dev/null, /dev/zero, /dev/full, /dev/random /dev/urandom /dev/arandom kernel CSPRNG - naming convention, meaning lp, pt, tty, fb, fd, hd, sd, sda SCSI driver used by libATA modern PAT/SATA driver, etc - devfs - Linux vs MS DOS/Windows
Hot swapping - hot-plugging - Wikipedia
How to Add and Delete Users on Debian 8 - sudoers, visudo | DigitalOcean
How to Add and Delete Users on Ubuntu 16.04 | DigitalOcean
Defragmenting HDD vs Trimming SSD Difference - Storage Devices - Linus Tech Tips
Don’t defragment SSDs – TRIM them | O&O Software
What is SSD TRIM? - Definition from WhatIs.com
login - What is the .Xauthority file? - Ask Ubuntu
X Server-Client!! What the hell? – Underlying Achitecture - MindOrks – Medium
linux - Where can I set environment variables that crontab will use? - Stack Overflow
shell - How can I run a cron command with existing environmental variables? - Unix & Linux Stack Exchange
linux - crontab execution doesn't have the same environment variables as executing user - definitive answer - Server Fault
https://www.cyberciti.biz/faq/how-do-i-rotate-log-files/
Logrotate - ArchWiki
How To Manage Logfiles with Logrotate on Ubuntu 16.04 | DigitalOcean
SP 800-92, Guide to Computer Security Log Management | CSRC
Log rotation - logrotate - Wikipedia
HowTo: The Ultimate Logrotate Command Tutorial with 10 Examples
Xorg - ArchWiki -- rootless xorg
The PDP-7 was used by Thompson for first version of UNIX
rhel - How can we change root password? - Unix & Linux Stack Exchange
How do I reset a lost administrative password? - Ask Ubuntu
Users and groups - ArchWiki
Changing User Passwords
linux - What is the difference between syslog, rsyslog and syslog-ng? - Server Fault
syslog - learning about general logging/logrotation on linux? - Unix & Linux Stack Exchange
Andrew File System - afs - Wikipedia
tmpfs - temporary file storage facility - Wikipedia
devpts - virtual filesystem /dev/pts - Wikipedia
USB Device Filesystem - usbfs
The Linux USB sub-system
sysfs - pseudo filesystem - Wikipedia
How to Delete User Accounts with Home Directory in Linux
SSD: trim on different filesystems - Unix & Linux Stack Exchange
Trim (computing) - Wikipedia
Industrial memory solutions - pdf
CFAST Cards - CompactFlash combined with Serial ATA interface - Swissbit | Mouser Europe
Network latency effect on application performance | Noction
What’s "normal" for latency and packet loss?
Internet Information Services - IIS - Wikipedia
LE LABEL (FAQ) - France Cybersecurity
Elliptic curve primality proving - ecpp - Wikipedia
ASFWS – Bee Ware WAF – Compass Security Blog
Side-channel attack - Wikipedia
Rubber-hose cryptanalysis - Wikipedia
Cryptanalysis - Wikipedia
Smart-SIC Analyzer : la crypto-analyse au service de la sécurité - RP Defense
Secure-IC : Cybersecurity company
First-order logic - predicate logic - first order predicate logic - Wikipedia
Discrete logarithm problem - Wikipedia
Discrete logarithm problem records - Wikipedia
Primality certificate/proof - Wikipedia
math - What is the fastest factorization algorithm? - Stack Overflow
prime factorization - fermat, pollard algorithms.pdf
For an end-user, is HTML5/JavaScript more secure than Flash? - Information Security Stack Exchange
LeeWu-VB2015.indd - 8aafc110fa2958c5216500d771021958a4bd.pdf
Linux Pluggable Authentication Modules PAM - Wikipedia
Hardware security module - HSM - DNSSEC, SSL Connection, Cryptocurrency wallet, Card payment systems/Bank HSMs, PKI Certificate Authorities HSMs, Wikipedia
Understanding Hardware Security Modules (HSMs)
ISO/SAE 21434 - Renesas_Automotive-Cyber-Security-Standardistation-v1.0.pdf
ISO/SAE 21434 Cybersecurity Engineering Proposal - summit-archive-1525889601.pdf
ISO/SAE CD 21434 - Road Vehicles -- Cybersecurity engineering
Web Service Security Cheat Sheet - OWASP
Testing for Web Services - OWASP
Web Service Security Testing Cheat Sheet - OWASP
Web Services Architecture and Security - OWASP
Techniques in Attacking and Defending XML/Web Services - OWASP
Web Services - OWASP
Effective Topology Tampering Attacks andDefenses in Software-Defined Networks - pdf
Database Management Software Tools - DbVisualizer - dbvis
Java remote method invocation - RMI, OO equivalent of RPC - Wikipedia
Common Object Request Broker Architecture - BROKER - Wikipedia
PowerBuilder - Wikipedia
ACID (computer science) - Atomicity, Consistency, Isolation, Durability - Database transaction reliability - Wikipedia
PAM - Pluggable Authentication Modules - ArchWiki
A Linux-PAM page - definitive guides - pluggable authentication module - The System Administrators' Guide - The Module Writers' Guide - The Application Developers' Guide
Encrypt passwords in powershell scripts - Virtual to the Core
Scheduling PowerShell scripts with usernames and encrypted password – 4sysops
Identity management / Identity and access management - IAM - IdM/IdAM
OSSTMM - Open Source Security Testing Methodology Manual
Category:Principle - OWASP - defense in depth , positive security model, fail securely, least privilege, avoid security through obscurity, keep security simple, detect intrusions, dont trust infrastructure, dont trust services, establish secure defaults
The Differences between Su, Sudo Su, Sudo -s and Sudo -i, root shell environment
Sudo, sudoers, hardening - ArchWiki
Natural language processing - NLP - Wikipedia
Google Cloud Platform - GCP - Wikipedia
List of GIAC Information and Cyber Security Certifications
GIAC Cyber Defense Certifications - sans institute tranings
How to set a root password on Ubuntu 18.04 Bionic Beaver Linux - LinuxConfig.org
security - nopasswd sudoers entry for apt command - Is it safe for my ssh user to be given passwordless sudo for `apt-get update` and `apt-get upgrade`? - Unix & Linux Stack Exchange
password - How to setup passwordless `sudo` on Linux? sudoers - Server Fault
sudo - Where did the "wheel" group get its name? - Unix & Linux Stack Exchange
Wheel group (computing) - Wikipedia
2.3. Configuring sudo Access
4.4.3. Limiting Root Access
Battling SELinux | Servers for Hackers
The Iptables Firewall | Servers for Hackers - Linux Hardening
Integrating SSL Certificates | Servers for Hackers
Why and How to Edit Your Sudoers File in Linux - Make Tech Easier
How is root able to write to the sudoers file with permissions set to 440? - Unix & Linux Stack Exchange
x32 ABI - Linux Kernel interfaces - running x86-64 with 32 bits pointers - Wikipedia
Linux kernel interfaces - API - Linux ABI - Wikipedia
Forward secrecy - FS - PFS - Wikipedia
Elliptic-curve cryptography - ECC - Wikipedia
Elliptic-Curves Diffie–Hellman key exchange - ECDHE - Wikipedia
Elliptic-curve Diffie–Hellman - ECDH - Wikipedia
Secure Password with PowerShell: Encrypting Credentials - Part 1 - password storage and retrieval - PDQ.com
Null session - attack Wikipedia
The Anatomy of a Attack : null session
NULL session access
Null session attacks: Who's still vulnerable?
The Anatomy of a Attack
7 Types of Privileged Accounts You Should Know | CyberArk
The Top Ways Privileged Accounts Are Exploited
External Attacks and Privileged Accounts: 5 Steps to Control the Threat Potential
What does "Privilege Account" really mean? | SecureAuth
Privileged account management critical to data security - Information Security Magazine
Privileged Access Management (PAM): Next Generation | SSH.COM
Credential cache — MIT Kerberos Documentation
What is the LM authentication protocol? - LAN Manager
LAN Manager - LM authentication - Wikipedia
LM, NTLM, Net-NTLMv2 – Medium
Exploiting Windows Authentication Protocols: Introduction - SMB relay attack, LM/LANMAN Hash, NT/NTLM Hash, and Kerberos,
Pass the hash - Hash harvesting - Wikipedia
defenceindepth: Attacking LM/NTLMv1 Challenge/Response Authentication
(2) New Messages!
11 Cron Scheduling Task Examples in Linux
How to Auto Execute Commands/Scripts During Reboot or Startup - linux, cronjob, rc.local
Dash - ArchWiki
bash - What is the point of sh being linked to dash? - Ask Ubuntu
Early Unix history and evolution - Dennis Ritchie
Thompson shell - first unix shell - Wikipedia
A tale of two shells: bash or dash [LWN.net]
Login manager - Wikipedia
X display manager (program type) - gdm, lightdm - Wikipedia
Getting to Understand Linux Shell(s), start-up scripts and the environment’s PATH variable, non-interactive/non-login
What are the shell's control and redirection operators? && vs || vs & vs ; - Unix & Linux Stack Exchange
shell - Is there a difference between `;` and `&&` and `|`? - Unix & Linux Stack Exchange
command line - How can I find my User ID (UID) from terminal? - Ask Ubuntu
command line - What is the functional difference between sudo su and sudo -i? definitive answer Ask Ubuntu
Parallel processing in Bash – subshells - Thoughts Improved
Difference between Login Shell and Non-Login Shell? - argv[0][0] holds '-' - Unix & Linux Stack Exchange
SANS Institute: Reading Room - Penetration Testing
What is a Pass The Hash Attack ? - The Security Buddy
Understanding 'INODES' in Linux/Unix Filesystems ~ Your Own Linux..!
nslu2 san - Network Storage Link for USB 2.0 Disk Drives - wiki
Please Don't Pass the Hash: Five Steps to Mitigate Attacks | CIO
Dissecting the Pass the Hash Attack - defense
Stop pass-the-hash attacks before they begin | CSO Online
authentication - Can an intruder still possibly succeed with pass-the-hash or pass-the-ticket on Windows 10 / Server 2016 networks where Credential Guard is enabled? - Information Security Stack Exchange
Technique: Pass the Ticket - MITRE ATT&CK™
How to Defend Against Pass-the-Ticket Attacks with Privileged Identity Management | BeyondTrust
Complete Domain Compromise with Golden Tickets | pass the ticket, mimikatz - Insider Threat Blog
Cred Checking - Credential ssessment - Matt Weeks - CanSecWest.pdf
Kerberos Attacks: What You Need to Know | CyberArk
Fear the golden ticket attack! - mimikatz | CSO Online
Getting Started - MITRE ATT&CK™
Technique: Credential Dumping - SAM Security Accounts Manager - mimikatz - pwdumpx - gsecdump - MITRE ATT&CK™
Technique: Valid Accounts - MITRE ATT&CK™
security: .bash_profile and .bashrc - login/non-login shells, interactive/non-interactive - mac terminal.app difference - - MITRE ATT&CK™
Software: Mimikatz - Techniques using it, groups using it - MITRE ATT&CK™
spoofing - Can I determine actual origin of spoofed sms text message? origin carrier - detect origin carrier spoofed sms - Information Security Stack Exchange
Short Message Service SMS spoofing - Wikipedia
Short Message service center - SMSC - Wikipedia
How does SMS spoofing work practically? - Information Security Stack Exchange
Spoof Text Messages - SMS- Spoof numbers and start falsify texts | spoofmytextmessage.com
Caller ID spoofing - Voice call spoofing - Wikipedia
Free Spoof Call | Free Caller ID Faker | Voice Call spoofing | SpoofCard
Spoof SMS - Avoid suspicion
ClockworkSMS: Easy Text Messaging API for Developers - sms spoofing
Twilio SMS Verification Example
Phone cloning - spoof phone receiving end - Wikipedia
Is it possible to spoof the receiving end of a phone number? - sim/phone cloning -Quora
Preventing Spam & Fraud with SMS Phone Verification - Twilio
mobile - How can SMS spoofing be detected? - Information Security Stack Exchange
spoofing - Reply to a spoofed SMS message - Information Security Stack Exchange
mobile - Programmatic SMS - Stack Overflow
SMS short message service - spoofing - Wikipedia
Phone Validator API to Check Numbers & Look Up Carriers - Twilio
Phone number validation - Lookup Quickstart - Twilio
phone number validation apu - Google Search
API Reference - In-Depth Reference for all Twilio APIs and SDKs - Twilio
Software: gsecdump - MITRE ATT&CK™
windows - Using Two-Factor Authentication to Stop Pass-the-Hash - Information Security Stack Exchange
Technique: Scheduled Task - MITRE ATT&CK™
Lateral Movement: When Cyber Attacks Go Sideways | SecurityWeek.Com
Network Lateral Movement - hacking technique - Wikipedia
Malware Lateral Movement: A Primer « Malware Lateral Movement: A Primer | FireEye Inc
The Hidden Dangers of Microsoft’s Task Scheduler - exploiting , abusing - Pentestmag
Windows Task Scheduler Zero Day Exploited by Malware
Windows Task Scheduler ALPC Zero-Day Exploited in the Wild: What You Need to Know, mitigation - definitive guide -
The Hype-Free Guide to Fileless Attacks | Barkly
Fileless malware - evading detection - Wikipedia
What is a fileless attack? How hackers invade systems without installing software | CSO Online
Computer forensics - Wikipedia
Anti-computer forensics - Wikipedia
Malware loves Windows Task Scheduler | CSO Online
Scheduled Tasks - Malwarebytes Labs | Malwarebytes Labs
The pImpl Idiom - Simplify C++!
interfaces - Is Dependency Inversion a valid alternative to the pImpl idiom? - Software Engineering Stack Exchange
PImpl - Pointer to Implementation - cppreference.com
Opaque pointer aka Pimpl idiom - Pointer to Implementation / Private Implementation - handle classes - bridge pattern - Compiler firewall idiom, d-pointer or Cheshire Cat
Private class data pattern - Pimpl - Private Implementaton, Opaque Pointer - Wikipedia
c++ - Pimpl idiom vs Pure virtual class interface - Stack Overflow
Vim writes to file without having permissions - definitive answer - Unix & Linux Stack Exchange
Ownership and Permissions
Java Card Overview
Java Card - Wikipedia
Java bytecode - Wikipedia
Getting information from an EMV chip card with Java – saush
Payment card - Wikipedia
Payment terminal - Wikipedia
Automated teller machine - Wikipedia
Contactless smart card - Wikipedia
Near-field communication - nfc -Wikipedia
Radio-frequency identification - rfid Wikipedia
What is the Difference Between EMV and PCI Compliance? | Ewing Oil
What is the Difference between EMV and PCI Compliance?
Enhancing Payment Card Security Integrating PCI DSS with EMV Technology
Official PCI Security Standards Council Site - Verify PCI Compliance, Download Data Security and Credit Card Security Standards - pci dss paper
EMV Compliance versus PCI Compliance Explained
How Does EMV Adoption Relate to PCI Compliance?
Will EMV Make You PCI Compliant? | PCI Compliance Guide
encryption - Does EMV protect against sniffing PAN (Primary Account Network) data from untrusted network? - Information Security Stack Exchange
credit card - EMV as authentication technology and not a data security technology - Information Security Stack Exchange
payment gateway - EMV(Chip) Cards - What's the point of having the chip card communicating directly to the authorising server? & Clarification of CDA in EMV - Information Security Stack Exchange
pci dss - Credit card processing in mobile app over Stripe - PCI DSS compiant? - Information Security Stack Exchange
Login shells in scripts called from cron | End Point
Bash (Unix shell) - Wikipedia
X Window System core protocol - Wikipedia
Xlib - libX11 - Wikipedia
XFree86 - Xorg ancestor - Wikipedia
Moving from windows to linux : Understanding - X11 / X Window System, X Server, Xorg, Xfree86 - definitive breakdown - Super User
colors - Getting colored results when using a pipe from grep to less - Super User
X11 for Windows and Mac - Thayer Computing Knowledge Base
Steganography: How to Hide Secret Data Inside an Image or Audio File in Seconds « Null Byte :: WonderHowTo
How are passwords stored in Linux (Understanding hashing with shadow utils)
Can a malware power on a computer? - Information Security Stack Exchange
DEFINITIVE - How to securely hash passwords? - definitive exhaustive answer - Theory - crypt(3) vs bcrypt vs pbkdf2 vs scrypt vs openpgp salted s2k - salt storage:secrecy - salt generation - csprng - client side hashing - iteration count/rounds number - key derivation - parallelism/precomputed tables, rainbow table - MD5 broken collisions vs pre-image
What is the algorithm used to encrypt Linux passwords? - Cryptography Stack Exchange
Difference Between Process And Thread in Linux
How Does SSL/TLS Chain Certificates and Its Validation work?
how does DNS server work
Understanding the working of Secure Socket Layer(SSL)
What is a System Call in Unix/Linux
Linux IPSec site to site VPN(Virtual Private Network) configuration using openswan
disclosure - How to proceed with a white-hat hacker claiming a vulnerability? - Information Security Stack Exchange
Index of /doc/Documentation/security/ - Mandatory Access Control MAC - Linux Security Modules LSM - SElinux, apparmor, smack, tomoyo, yama
Hacking the PS4, part 1 - Introduction to PS4's security, and userland ROP
SANS - Information Security Resources - ptrace
SANS - Information Security Resources - malware list
CVE - Common Vulnerabilities and Exposures (CVE)
Index of /code/skape/shellcode examples
Dirty Cow: Story of a privilege escalation vulnerability - Aporeto
operating systems - Why/how is GDB allowed to attach to a process and read/write to attached process' address space? CAP_SYS_PTRACE capability - Reverse Engineering Stack Exchange
getcap, setcap and file capabilities — insecure.ws
Linux Capabilities - vs setuid/suid - getcap, getfattr - ArchWiki
Taking Advantage of Linux Capabilities | Linux Journal - 2002
Linux Kernel Capabilities Explained - +ep effective and permitted - DZone Security
Technique: Process Injection - ptrace - MITRE ATT&CK™
GDS - Blog - Linux based inter-process code injection without ptrace(2)
networking - What's the difference between RDP vs VNC? - Super User
American National Standards Institute - ANSI - Wikipedia
Institute of Electrical and Electronics Engineers - IEEE - Wikipedia
International Organization for Standardization - ISO - Wikipedia
International Electrotechnical Commission - IEC - Wikipedia
Key escrow - fair cryptosystem - Wikipedia
Advanced Encryption Standard - AES - Rijndael - FIPS 197 - Wikipedia
smartcard - What's the difference between the same model with and without FIPS 140 certification? common criterias - Information Security Stack Exchange
Common Criteria - CC - Wikipedia
compliance - Is Common Criteria (CC) a suitable standard to certify web applications - Information Security Stack Exchange
What is the difference between a wide area network WAN and the Internet? -Quora
Wide-area network - WAN - Wikipedia
On the Security of TLS-DH and TLS-RSA in the Standard Model
Heartbleed - buffer-overflow vuln in openssl - heartbeat exploitation - Wikipedia
Common Vulnerabilities and Exposures - CVE - Mitre Project
Mitre Corporation - Wikipedia
National Vulnerability Database - NVD - Wikipedia
Common Weakness Enumeration - CWE - Mitre Project
CVE - Search CVE List
NVD - Search and Statistics
Intelligent Input Bus - IBus - Wikipedia
Localization - ArchWiki
IBus - ArchWiki
webserver - Should I disable TLS 1.0 on my servers? - Information Security Stack Exchange
What are the main vulnerabilities of TLS v1.1? - Information Security Stack Exchange
Why TLS 1.3 is a Huge Improvement | Venafi
SSL and TLS Deployment Best Practices · ssllabs/research Wiki · GitHub
aes - At what stage is DHE and RSA used during the SSL/TLS handshake? - Cryptography Stack Exchange
Tunneling protocol - Wikipedia
Secure Shell - SSH - Runs on top on TCP - Layers - SSH-over-SCTP, ECDSA, ECDH, UMAC - Vulnerabilities - RFCs
In what cases is TLS more useful than IPsec and vice versa? - Quora
Which is better for server-to-server-communication: IPSec or TLS? - Information Security Stack Exchange
tls - IPSec vs SSL : Similarities and Differences - Cryptography Stack Exchange
What is a SSL VPN? A Quick Guide to SSL & TLS
cryptography - IPsec (Internet Protocol Security) facts - Information Security Stack Exchange
path - Why running command as sudo returns command not found? - Unix & Linux Stack Exchange
permissions - Why doesn't `sudo cd /var/named` work? - Ask Ubuntu
Role-based access control - RBAC - Wikipedia
Discretionary access control - DAC - Wikipedia
Access control list - ACL - Wikipedia
Capability-based operating system - Wikipedia
Capability-based security - DIFFERENT from POSIX 1e/2c "Capabilities" mechanism (POSIX draft 1003.1e) - Wikipedia
Access control - Wikipedia
Computer access control - MAC, RBAC, ABAC, BGAC, HBAC Wikipedia
linux - Difference between shell variables and environment variables - Stack Overflow
xrandr - X Window System Extension - Resize AND Rotate - ArchWiki
XCB - X protocol C-language Binding - Xlib alternative - Wikipedia
Windowing system - Wikipedia
Window manager - Wikipedia
X window manager - Wikipedia
Display server - window server Wikipedia
Desktop Window Manager, DWM - Previously Desktop Compositing Engine, DCE - Wikipedia
List of display/window servers - Wikipedia
Desktop environment - How it relates to Window Managers - Wikipedia
Shell (computing) - Graphical GUI Shells, desktop environment, window manager -Wikipedia
Differences between VNC and ssh -X (X forwarding) - Unix & Linux Stack Exchange
xorg - What does DISPLAY=:0.0 actually mean? - Unix & Linux Stack Exchange
NX technology - Desktop virtualization, nxproxy, nxagent, similar to Xephyr, developed by NoMachine - Wikipedia
what's going in /usr/bin/gnome-terminal? vs gnome-terminal-server - Ask Ubuntu
GNOME Terminal Server - gnome-terminal-server vs gnome-terminal
GitHub - 0x09AL/WordSteal: This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does not keep responsibility for any illegal action you do.
C2 Command-and-control servers: The puppet masters that govern malware
Session Hijacking Bug Exposed GitLab Users Private Tokens | Threatpost | The first stop for security news
Comparison between Centralized and Distributed Version Control Systems - Stack Overflow
GitLab Security Overview | DevSecOps with GitLab
web application - Why Do we Need CAPTCHA? In what case we should use it? - optical character recognition (OCR) - Information Security Stack Exchange
Stanford Researchers Crack Captcha Code | Gizmocrazed - Future Technology News
Google Can Now Tell You're Not a Robot With Just One Click | Captcha - Recaptcha - image based - WIRED
shutdown - How to run a command before the machine automatically shuts down? - Ask Ubuntu
How to run commands at shutdown on Linux | Opensource.com
Daemon (computing) = Disk And Execution Monitor = service = started task = ghost job - Wikipedia
List of Unix daemons - Wikipedia
Kernel (operating system) - Wikipedia
List of Unix commands - Wikipedia
systemd - Wikipedia
Upstart (software) - Wikipedia
init - SysV-style - /etc/rc - Wikipedia
logging - Difference between /var/log/messages, /var/log/syslog, and /var/log/kern.log? - Ask Ubuntu
journalctl vs syslog - How To Use Journalctl to View and Manipulate Systemd Logs | DigitalOcean
10 Tools To Add Some Spice To Your UNIX/Linux Shell Scripts - script rounding off - nixCraft
The Story Behind 'init' and 'systemd': Why 'init' Needed to be Replaced with 'systemd' in Linux
SysV init must die - period
Can root kill init process? halt command - Unix & Linux Stack Exchange
Why systemd is winning the init wars and other things aren't | Hacker News
How To Configure a Linux Service to Start Automatically After a Crash or Reboot – Part 1: Practical Examples | DigitalOcean
Systemd vs SysV-style init vs Upstart — Linux Service Management Throwdown
After Linux civil war, Ubuntu to adopt systemd | ZDNet
init - What are the pros/cons of Upstart and systemd? - Unix & Linux Stack Exchange
Universal Plug and Play - UPnP - Wikipedia
NAT Port Mapping Protocol - PMP - Wikipedia
Port (computer networking) - Wikipedia
Dependency Injection in C++ with Boost - Strategy Pattern
Dependency inversion principle - DIP - SOLID pattern - Plugin, Service Locator, Dependency InjectionWikipedia
SOLID principles - Single Responsibility, Open-Closed, Liskov Substitution, Interface Segregation, Dependency Inversion
Dependency injection - Wikipedia
Inversion of control principle - followed by design patterns as software frameworks, callbacks, schedulers, event loops, dependency injection, template methods - Related to SOLID Dependency Inversion Principle - Wikipedia
Coupling (computer programming) - Wikipedia
Inversion of Control (~frameworks, dependency injection) VS Dependency Inversion – Medium
Dependency Injection Is NOT The Same As The Dependency Inversion Principle · Los Techies
Technique: LLMNR/NBT-NS Poisoning - Link-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS) - MITRE ATT&CK™
What is LLMNR & WPAD and How to Abuse Them During Pentest ? – Pentest Blog
How to Disable LLMNR & Why You Want To - Black Hills Information Security
Web Proxy Auto-Discovery Protocol - WPAD - Wikipedia
Disable WPAD now or have your accounts and private data compromised - PAC Proxy-Auto Config - | PCWorld
When domain names attack: the WPAD name collision vulnerability – proxy auto-config PAC file - Naked Security
proxy - WPAD name collision attack victim: possible information leak - Information Security Stack Exchange
Category:Clear text protocols - telnet, ftp, ncsa telnet, oftp, rtelnet - Wikipedia
Ending Clear Text Protocols - Server Support & Management by rackAID
Hardening Network Devices - 49-Hardening_Network_Devices-tutorial-V1.5-WOV.pdf
Best practices for hardening new sever in 2017 - network hardening - DigitalOcean
Network security 101: Default router settings, network hardening
Network security policy - nsp - Wikipedia
Address space layout randomization - Wikipedia
Security-focused operating system - Wikipedia
AppArmor - LSM Linux kernel security module - restricting capabilities - Wikipedia
security - system() vs execve() in setuid programs - environment variable PATH - shell injection - LD_LIBRARY_PATH
Operating systems course - Spring 2018 :: Operating systems 2018
Qubes OS - security-focused desktop os - Wikipedia
Tomoyo Linux - LSM Linux kernel security module - Wikipedia
Smack (software) - Simplified Mandatory Access Control - LSM linux kernel security module - Wikipedia
RSBAC - Rule Set Based Access Control - Wikipedia
grsecurity - Wikipedia
Systrace - Wikipedia
Exploiting Concurrency Vulnerabilitiesin System Call Wrappers - pdf
USENIX WOOT07, Exploiting Concurrency Vulnerabilities in System Call Wrappers, and the Evil Genius | Light Blue Touchpaper
seccomp - seccomp-bpf - successor of the no longer supported systrace - Wikipedia
Linux Intrusion Detection System - LIDS - kernel security patch - MAC implementation - Wikipedia
Chapter 8. strace - Red Hat Customer Portal
Chapter 9. ltrace - Red Hat Customer Portal
GitHub - HJLebbink/asm-dude: Visual Studio extension for assembly syntax highlighting and code completion in assembly files and the disassembly window -Visual Studio extension for assembly syntax highlighting and code completion in assembly files and the disassembly window
Security Recommendations for Hypervisor Deployment on Servers - VM security | NIST
malware - VM security - How do virtual machines help security? - Information Security Stack Exchange
virtualization - Is a VM only as secure as its host? - Information Security Stack Exchange
operating systems - Is dual-booting an OS more or less secure than running a virtual machine? - Information Security Stack Exchange
Separation kernel - security - Wikipedia
Design and Verification of Secure Systems - pdf
Java Optimize and Decompile Environment (JODE)
Reverse Engineering To Learn .NET Better
Three hypervisor and virtual environment security concerns
Hypervisor - Type 1 vs Type 2 - Wikipedia
virtualization - How secure are vm virtual machines really? False sense of security? - Information Security Stack Exchange
File permissions and attributes - ls output - execute permissions x vs s vs S vs t vs T - suid/Set-UID - sticky bit - ArchWiki
chroot - system call, wrapper - chroot jail - sandbox, honeypot - setuid, privilege escalation /etc/passwd, /etc/shadow
Unix - Frequently Asked Questions (4/7) [Frequent posting]Section - How can I get setuid shell scripts to work?
Disk encryption - ArchWiki
Linux process infection (part I) - Tarlogic Security - Cyber Security and Ethical hacking
A guide to Linux Privilege Escalation - Exploiting SUID Executables - Kernel exploits - Exploiting badly configured cron jobs - payatu
Basic Linux Privilege Escalation - Introductory Guide
Local Linux Enumeration & Privilege Escalation Cheatsheet – Find setuid/SUID root files - Rebootuser
IP, DNS & Domain Enumeration Cheatsheet – Rebootuser
Privilage Escalation - basic examples
GitHub - rebootuser/LinEnum: Scripted Local Linux Enumeration & Privilege Escalation Checks - tool
GitHub - sleventyeleven/linuxprivchecker: linuxprivchecker.py -- a Linux Privilege Escalation Check Script - tool
.NET Reflector - decompiler, static analyzer - Wikipedia
Understanding cross domain attack | cross site scripting - xss - Network Security Protocols
Cross-site scripting - XSS - Wikipedia
An Inter-Domain Collaboration Scheme to Remedy DDoS Attacks in Computer Networks - DDOS Mitigation - IEEE Journals & Magazine
It might be time to stop using antivirus - antimalware drawbacks | Ars Technica
How to Make Your Own Bad USB - microcontroller reprogramming « Null Byte :: WonderHowTo
This thumbdrive hacks computers. “BadUSB” exploit makes devices turn “evil” | Ars Technica
Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps | Ars Technica
BadUSB vs Rubber Ducky - USB Rubber Ducky - Hak5 Forums
“BadUSB” Vulnerability: An Introduction - The-bad-USB-vulnerability1.pdf
usb - Is all the alarmism around BadUSB really called for with respect to host devices? - Information Security Stack Exchange
directory - What are directories, if everything on Linux is a file? definitive answer - everything - Ask Ubuntu
The badBIOS Analysis Is Wrong. : netsec
badBIOS - Schneier on Security
malware - Transmitting malicious code over audio speakers - Information Security Stack Exchange
malware - Never believed BadBios...but do now...is there help? - Information Security Stack Exchange
malware - badBIOS reflashing - Information Security Stack Exchange
malware - What happened with badBios - Information Security Stack Exchange
rootkits - Is badBIOS real? - Information Security Stack Exchange
#badBIOS comilation of Ruiu's observations - Security Art Work
4 reasons BadBIOS isn't real | CSO Online
BadBIOS: Next-gen malware or digital myth? | InfoWorld
More on my ongoing chase of #badBIOS malware. It's been difficult to confirm ...
Implementing and Detecting a PCI Rootkit - blackhat - pdf
Researcher skepticism grows over badBIOS malware claims | Ars Technica
Errata Security: #badBIOS features explained
malware - Do I need to have antivirus software installed? - Ask Ubuntu
Security Guide - Red Hat
Writing a Bootloader Part 1 | Alex Parker's Website
BootStomp: On the Security of Bootloaders in Mobile Devices
Hardware and firmware attacks: Defending, detecting, and responding - Facebook Code
The whys and hows of secure boot | Embedded
Secure Bootloader Design Techniques for MCU - pdf
Microcontroller - MCU Microcontroller Unit - UC microcontroller -vs SoC System On Chip
How to bolster BIOS security to prevent BIOS attacks
When BIOS updates become malware attacks - tpm use -
What is Trusted Platform Module (TPM)? - Definition from WhatIs.com
SP 800-147, Basic Input/Output System (BIOS)/EFI/UEFI Protection Guidelines | CSRC
hardening - Does adding a password to BIOS prevent malware from infecting it? - Information Security Stack Exchange
Protecting the BIOS from malware - Information Security Stack Exchange
webserver - Does password-protecting a server's BIOS help in securing sensitive data? - definitive answer - Information Security Stack Exchange
hardening - Does malware which infects the BIOS/ Firmware always need 'root' access to do so? - nx bit, smm protections, aslr - Information Security Stack Exchange
BIOS and Boot Loader Security - red hat
The Basics of SMB Signing (covering both SMB1 and SMB2) – Jose Barreto's Blog
What is SMB Signing?
Configure SMB signing via Group Policy - RootUsers
Active Directory Integration in Linux - ArchWiki
Lightweight Directory Access Protocol - LDAP - Wikipedia
Server Message Block - SMB - CIFS Common Internet File System - Wikipedia
Server Message Block: SMB Relay Attack (Attack That Always Works)
Metasploit SMB – Exploitation of Port 445 | MACHN1k
Find The IP Address Of A Website Behind Cloudflare - origin server's IP tracking
The Importance of HTTP Strict Transport Security (HSTS) - RootUsers
hash - What harm is there in obtaining password hashes in a Windows environment? - challenge-repsonse - Security Stack Exchange
How SMB signing works? - Information Security Stack Exchange
ms08-068 — Preventing SMBRelay Attacks » SkullSecurity
How to Steal Windows Login Credentials Abusing the Server Message Block (SMB) Protocol
Pass the Hash, Part III: How NTLM Will Get You Hacked
A Closer Look at Pass the Hash, Part I
A Closer Look at Pass the Hash, Part II: Prevention
Scanning for SMB vulnerabilities using Nmap Script Engine NSE
Link-Local Multicast Name Resolution - LLMNR - Wikipedia
SecurityTeam/Roadmap/KernelHardening - ptrace protection - Ubuntu Wiki
Common Vulnerability Scoring System - CVSS - Wikipedia
GPG gnupg - Is layered encryption PGP more secure than long passwords? - Information Security Stack Exchange
How to get a "backtrace" (like gdb) using only ptrace (linux, x86/x86_64) - libunwind - Stack Overflow
Exceptions and Error Handling - stack unwinding - never throw exception from destructor - C++ FAQ
Operating System Development - OSDev Wiki
CPU Registers x86 - OSDev Wiki
CPU Registers x86-64 - OSDev Wiki
x86 calling conventions - cdecl - stdcall - Wikipedia
Global Descriptor Table - GDT - x86 - OSDev Wiki
ELF 32bits - OSDev Wiki
DWARF - elf - OSDev Wiki
Modular Kernel - OSDev Wiki
Writing Bootloader,Hello World Bootloader Tutorial | TAJ Operating System
Rolling Your Own Bootloader - OSDev Wiki
GRUB - GNU bootloader - OSDev Wiki
Stack frame unwinding on ARM - libunwind-LDS.pdf
c++ - What is stack unwinding? - Stack Overflow
Git Hooks | Learn how to use pre-commit hooks, post-commit hooks, post-receive hooks, and more. | Matthew Hudson
Getting the call stack without a frame pointer
Programmatic access to the call stack in C++ - backtrace, libunwind, glibc backtrace/backtrace_symbols - Eli Bendersky's website
Name mangling - cxxabi demangle - c++filt - C, C++, Java, Pascal, Rust, Swift, Objective C, Fortran
Archives - Programming tricks - Eli Bendersky's website
c - What is the meaning of "%-*.*s" in a printf format string - printf %- Stack Overflow
Understanding lvalues and rvalues in C and C++ - Eli Bendersky's website
Returning multiple values from functions in C++ - Eli Bendersky's website
AES encryption of files in Python with PyCrypto - Eli Bendersky's website
C++11 threads, affinity and hyperthreading - Eli Bendersky's website
Programming a Linux Debugger Part 1: Setup - breakpoints, registers and memory access, ELF DWARF, signals, stepping source code, source-level breakpoints, stack unwinding
Programming a Linux Debugger Part 3: Registers and memory - ptrace use
Restricting permissions on ptrace - yama vs selinux « codeblog
assembly - What happens if you use the 32-bit int 0x80 Linux ABI in 64-bit code? - Stack Overflow
Security Hardening - ArchWiki -- Choosing secure passwords, Maintaining passwords, Password hashes, pam_cracklib - Full Disk Encryption, Filesystem disk encryption, mount options, File access permissions, /etc/pam.d/system-login delay after failed login - rectricting root, prefer sudo over su - MAC ruleset, ACLs - Kernel hardening - Sandboxing applications - SSH Key-based authentication - DNS queries security DNSSEC , DNSCrypt , DNS Caching Proxy Server dnsmasq - Physical Security IEEE 1394 FireWire, Thunderbolt, PCI Express, locking down bootloaders syslinux, GRUB/BIOS - Rogue USB devices Protection
sysctl - 3.1.1 Increasing the size of the receive queue. 3.1.2 Increase the maximum connections 3.1.3 Increase the memory dedicated to the network interfaces 3.1.4 Enable TCP Fast Open 3.1.5 Tweak the pending connection handling 3.1.6 Change TCP keepalive parameters 3.1.7 Enable MTU probing 3.1.8 TCP timestamps 3.1.9 Enable BBR 3.2 TCP/IP stack hardening 3.2.1 TCP SYN cookie protection 3.2.2 TCP rfc1337 3.2.3 Reverse path filtering 3.2.4 Log martian packets 3.2.5 Disable ICMP redirects 3.2.6 Ignore ICMP echo requests 3.3 Other 3.3.1 Allow unprivileged users to create IPPROTO_ICMP sockets
Mastering sysctl and sysctl.conf for LPIC-3 Linux Security Hardening
SELinux/Tutorials/The security context of a process - process privileges - Confining applications - Gentoo Wiki
Learning SELinux - Gentoo Wiki
Learning SELinux/Tutorials - Gentoo Wiki
operating systems - What's the difference between Process Context and Process Control Block? process isolation - Computer Science Stack Exchange
Securing and Hardening the CentOS 7 Kernel With Sysctl - Vultr.com
sysctl - procfs
Yama: add additional ptrace scopes [LWN.net]
Deep Wizardry: Stack Unwinding, libc backtrace, dwarf segment, .debug_frame, .eh_frame
GitHub - cslarsen/libunwind-examples: A few libunwind examples - demangles backtrace
Implementing a Debugger: The Fundamentals - procfs vs ptrace - /proc/<pid>/mem access to process memory - | Backtrace.io
How does GDB find the symbol of a function when backtracing in MIPS Linux? - dwarf, backtrace
How Does a C Debugger Work? (GDB Ptrace/x86 example) - valgrind vs gdb, qemu, ptrace implementation insights - (gdb) break *0x972
Stack Backtracing Inside Your Program | libc backtrace - Linux Journal
register (keyword) - Wikipedia
Libsupcxx - libsupc++ rtti - exception handling - OSDev Wiki
Itanium C++ ABI - cxxabi
Kernel Crash Dump - kernel disruption, panic, NMI non maskable interrupts, MCE machine check exceptions, hardware failure, manual intervention -
Mastering CVSS version 3.0 - Common Vulnerability Scoring System - Elearning Course Transcript
strip - What are stripped and not-stripped executables in Unix? - Unix & Linux Stack Exchange
Heartbeat (computing) - "ligne de vie" - Wikipedia
Maximum transmission unit - mtu - Wikipedia
Linux Tune Network Stack (Buffers Size) To Increase Networking Performance - /proc/sys/net/ipv4/tcp_mem - nixCraft
linux - What's the practical limit on the size of single packet transmitted over domain socket? /proc/sys/net/ipv4/wmem_max - Stack Overflow
Need some clarification regarding casting in C - why do variadic functions need cast - Stack Overflow
c++ - printf and pointers - mandatory cast in variadic functions - Stack Overflow
c++ - printf and pointers - definitive answer - Stack Overflow
cryptography - Is using a public-key for logging in to SSH any better than saving a password? - Information Security Stack Exchange
How does exec bash builtin work internally? - Unix & Linux Stack Exchange
Mitigating SSH based attacks – Linux Hardening - Top 15 Best SSH Security Practices
linux - How to stop/prevent SSH bruteforce - Server Fault
Hack Like a Pro: How to Crack User Passwords in a Linux System « Null Byte :: WonderHowTo
Hack Like a Pro: How to Grab & Crack Encrypted Windows Passwords « Null Byte :: WonderHowTo
Hack Like a Pro: How to Crack Online Passwords with Tamper Data & THC Hydra « Null Byte :: WonderHowTo
Password Cracking tutorials « Null Byte :: WonderHowTo
How to Crack Shadow Hashes After Getting Root on a Linux System « Null Byte :: WonderHowTo
How to Perform Local Privilege Escalation Using a Linux Kernel Exploit « Null Byte :: WonderHowTo
Can a brute force attack be certainly prevented on a unix/linux shell? - Information Security Stack Exchange
Exposing the Invisible - google dork
Configure SSH key based secure authentication | SSH.COM
Linux kernel namespaces - Wikipedia
Unified Extensible Firmware Interface - UEFI - specification that defines a software interface between an operating system and platform firmware - replaces legacy BIOS - secure boot - secure boot criticism
linux - kernel: Namespaces support - Unix & Linux Stack Exchange
Namespaces in operation, part 5: User namespaces - capabilities -[LWN.net]
Linux Namespaces – container implementation - Ed King – Medium
Introduction to Linux namespaces - Part 1: UTS | Yet another enthusiast blog!
Isolate containers with a linux user namespace | Docker Documentation
Namespaces Tutorial: Isolate Your Linux System | Toptal
networking - Difference between SSH and SSL, especially in terms of "SFTP" vs. "FTP over SSL" - CA PKI - Stack Overflow
cryptography - What is the difference between SSL vs SSH? Which is more secure? - Information Security Stack Exchange
Why doesn't SSH use TLS? - Cryptography Stack Exchange
Secure Shell: How Does SSH Work - slashroot
List of Kill Signals - manual man 7 signal - Unix & Linux Stack Exchange
Protecting a Qt Application or a Device Against Hacking, Part 1 - Qt Blog
GitHub - radareorg/radeco: radare decompiler tool based on radeco-lib
tools - What are the main features of radare2? - Reverse Engineering Stack Exchange
https://www.radare.org/doc/elf-tutorial
Index of /doc - radare2
Step-by-step example for using GDB within Emacs to debug a C or C++ program
Runlevel - /etc/rc
Run Levels in Linux - GeeksforGeeks
SysV init - ArchWiki
how to sequence systemd shutdown processes on linux
How to mitigate the risk of a TOCTTOU attack
std::mutex - cppreference.com
Futex - Wikipedia
What is the effect of extern "C" in C++? - Stack Overflow
Top 20 C++ multithreading mistakes and how to avoid them - A CODER'S JOURNEY
std::lock_guard - cppreference.com
c++ - Why are mutexes different from atomic operations in that the former is OS level and the latter is processor level? - Stack Overflow
static members - cppreference.com
POS36-C. Observe correct revocation order while relinquishing privileges - SEI CERT C Coding Standard - drop root privilege - setuid, setgid - privilege escalation
POS37-C. Ensure that privilege relinquishment is successful - drop privilege, setuid, setgid, getuid - privilege escalation - SEI CERT C Coding Standard - Confluence
POS38-C. Beware of race conditions when using fork and file descriptors - security - SEI CERT C Coding Standard - Confluence
POS39-C. Use the correct byte ordering when transferring data between systems - endianness, ntoh, hton - SEI CERT C Coding Standard - Confluence
POS44-C. Do not use signals to terminate threads - SEI CERT C Coding Standard - Confluence
How to With Git: Rollback Commit - undo, uncommit - HostingAdvice.com
How to With Git: Undo Commit - HostingAdvice.com
git bash - How do I undo the most recent commits in Git? - Stack Overflow
Touchscreen - Wikipedia
Resistive touchscreen - Wikipedia
Capacitive sensing - touchscreen - Wikipedia
c++ - Why can't we initialize class members variables at their declaration? initialization - Stack Overflow
Ecran tactile capacitif (Technologie) | capacitive sensing touchscreen - Interfaces tactiles
Ecran tactile résistif (Technologie) | resistive touchscreen - Interfaces tactiles
How Facebook, Apple and Microsoft are contributing to an openly licensed map of the world – The ODI
DigitalGlobe satellite imagery launch for OpenStreetMap | DigitalGlobe Blog
OpenStreetMap - google map alternative, privacy respectuous
GitHub - SecWiki/linux-kernel-exploits: linux-kernel-exploits Linux平台提权漏洞集合
XDM (display manager) - Wikipedia
naming - Is having C++ header files without h extension a good practice? - Software Engineering Stack Exchange
Thoughts on Header File Extensions: .h vs .hpp — Embedded Artistry
bcrypt - Cryptographic hash functions & message authentication codes table -Wikipedia
Why haven't game developers been able to stop crackers from cracking and pirating their games until now (mainly offline games)? - game cracking prevention Quora
How do games detect when they have been cracked? obfuscation - gamedev
5 Hilarious Ways Game Designers Are Messing With Pirates | Cracked.com
passwords - Reviews of Argon2 - vs bcrypt - Information Security Stack Exchange
hash - What is the specific reason to prefer bcrypt or PBKDF2 over SHA256-crypt in password hashes? - Information Security Stack Exchange
1.3. Dropping Privileges in setuid Programs - Secure Programming Cookbook for C and C++ [Book] - secure coding
scripting - Using the setuid bit properly - Unix & Linux Stack Exchange
security - using SUID bit to drop privileges - Unix & Linux Stack Exchange
Is there a way for non-root processes to bind to "privileged" ports on Linux? capabilities - Stack Overflow
c - Dropping root privileges - setuid - Stack Overflow
yum - Non-Root Package Managers - Unix & Linux Stack Exchange
linux - Allow non-admin users to install packages via apt or rpm? - Unix & Linux Stack Exchange
linux - User-local package management system - Unix & Linux Stack Exchange
getent - Wikipedia
vipw - /etc/passwd - /etc/shadow - Wikipedia
Why pirate / crack software often detected "is containing virus" as malware? - Super User
chsh - setuid, /etc/passwd - Wikipedia
Secure Salted Password Hashing - definitive handy and thorough guide - How to do it Properly - salt generation csprng - Keyed Hashes and Password Hashing Hardware - PBKDF2, bcrypt - store and validate password - web application - secure versions of crypt(3) - timing attack - offline crack - SlowEquals - fast vs slow hash function
Storing User Passwords Securely: hashing, salting, and Bcrypt
Crypt(1) (Unix) - Broken command - Wikipedia
Hashing passwords: SHA-512 can be stronger than bcrypt (by doing more rounds) - crypt(3) vs bcrypt - code example - definitive explanation - Michael Franzl
Use Bcrypt or Scrypt Instead of SHA* for Your Passwords, Please! - slow hashes for password vs fast hashes - Rietta
GitHub - trusch/libbcrypt: A c++ wrapper implementation around bcrypt password hashing
List of PBKDF2 implementations - Wikipedia
Anti-weakpasswords / Repositories - pbkdf2 implementations · GitHub
Security/Features - Ubuntu Hardening -- password hashing - crypt id 6 - kernel hardening - ptrace_scope - TPM -UEFI secure boot - build flags fPIE, RELRO, NX Non-Executable Memory, BIND_NOW, Fortify Source - /proc/PID/maps protection, symlink/hardlink protetion - zero-address protection, /dev/kmem - Ubuntu Wiki
crypt(3) (C) - bcrypt blowfish based - Wikipedia
Salt (cryptography) - Wikipedia
An Introduction to FIPS 140-2 and Common Criteria - SecureIDNews
Evaluation Assurance Level EAL - common criterias - Wikipedia
Security Target - common criterias - Wikipedia
compliance - Security evaluation: what is there apart from common criteria? - Information Security Stack Exchange
Guidelines for Developer Documentation - Common Criteria Developers Guide_1_0.pdf
audit - Security evaluation terminology - Information Security Stack Exchange
network - Evaluating hosting providers for Common Criterias development environment - Information Security Stack Exchange
regulation - What compliance problem does "Common Criteria Certification" solve? - Information Security Stack Exchange
why Common Criteria evaluation wont give 100% security - Information Security Stack Exchange
ROCA vulnerability - cryptographic weakness - Wikipedia
Difference Between EAL 1-7 in Common Criteria Standard? - Information Security Stack Exchange
What is Common Criteria Certification, and Why Is It Important? - Blancco
Common Criteria Licensed Laboratories - UL, Turkey
Common Criteria Publications : New CC Portal
Technical Communities Common Criteria : Application Software, Biometrics Security, Dedicated Security Component,Full Disk Encryption , Network Fundamentals and Firewalls, USB Portable Storage Devices - New CC Portal
Certified Products Common Criteria: New CC Portal
Protection Profiles Common Criterias : New CC Portal
compliance - Certifiable standards for server security, besides PCI-DSS ? alternatives - Information Security Stack Exchange
Understanding and generating the hash stored in /etc/shadow - mkpasswd overfeatured frontend to crypt(3) - equivalent python code - salt generation
Rainbow Hash Cracking - Ophcrack - password length/strength
linux - How is a password hash encoded in the /etc/shadow password file? crypt(3) base64 alternative encoding - Server Fault
linux - How to create an SHA-512 hashed password for /etc/shadow ? crypt(3), grub-crypt - Server Fault
linux - Manually generate from CLI password for /etc/shadow - crypt(3) - openssl passwd solution - Unix & Linux Stack Exchange
shadow - crypt(3) $6$ password hash algorithm (based on SHA-512) in Java? - Stack Overflow
mkpasswd available on Ubuntu in whois package
security - How to create SHA512 password hashes on command line with same result as crypt(3) for /etc/shadow - Unix & Linux Stack Exchange
hash - Is hashing passwords with bcrypt and a constant salt more unsecure than SHA1? adobe passwords leak - Information Security Stack Exchange
hash - What is the length of a hashed string with SHA512? - 86 bytes with base64, 64 bytes otherwise Stack Overflow
To Salt or Not To Salt? — Salting is not the only answer to securing passwords - linkedin 2014 passwords leak
Use of salt to hash a password - Cryptography Stack Exchange
Salted Password Hashing - Doing it Right - CodeProject
passwords - How to store salt? pepper, precomputation attack, ranibow table, kdf, pbkdf2, bcrypt, blowfish, scrypt - definitive explanation - Information Security Stack Exchange
Storing Passwords Securely- definitive breakdown - password secure storage- Adaptive Key Derivation Functions - pbkdf2, bcrypt, scrypt, argon2 - cryptographic hash function vs password hash function - key stretching - precomputing attack/rainbow table
passwd - unix command - Wikipedia
Password Cracker - usage of crypt_r() in code - crypt(3) - code example
CS 241 - System Programming - academic course - fork, wait, heap memory, signal process control, memory allocator, threads, mutex lock, semaphores, critical section, reader writer problem, producer consumer, deadlock, dining philosopher, virtual memory page tables, pipes, tcp handshake/server, networking, schedulings, epoll, rpc
CS 241 - System Programming - academic course - fork, wait, heap memory, signal process control, memory allocator, threads, mutex lock, semaphores, critical section, reader writer problem, producer consumer, deadlock, dining philosopher, virtual memory page tables, pipes, tcp handshake/server, networking, schedulings, epoll, rpc
CS 241 - System Programming - academic course - Machine problems hands-on
Unix crypt(3) with SHA-256/512 - good manual
Reentrancy (computing) - thread-safety - concurrency - multithreading - Wikipedia
c++ - What exactly is a reentrant function? - thread-safety - concurrency - multithreading - Stack Overflow
Adding Salt to Hashing: A Better Way to Store Passwords - salt length
How does the crypt(3) function work with some examples of crypt function in C? code example - Quora
Troy Hunt: Why am I in a data breach for a site I never signed up to? haveibeenpwned
Password Hashing in Action: Understanding bcrypt - algorithm
security - Salt Generation and open source software - salt storage - Stack Overflow
cryptography - Password Hashing: add salt + pepper or is salt enough? - Information Security Stack Exchange
authentication - HMAC - Why not HMAC for password storage? - Information Security Stack Exchange
security - Where do you store your salt strings? - password salt storage - Stack Overflow
How Rainbow Tables work
cryptography - What are rainbow tables and how are they used? vs hash table - Information Security Stack Exchange
Securing VNC with SSH - vnc security
Could someone explain to me what makes VNC insecure in a corporate environment? vnc security : AskNetsec
threat mitigation - How do I assess and mitigate the security risks of a VNC tool? - Information Security Stack Exchange
TightVNC Frequently Asked Questions - vnc security
vnc - Remote access to my home PC - minimizing the risk - Information Security Stack Exchange
linux - Security Concerns with X11 Forwarding - Information Security Stack Exchange
x11 forwarding - Risks of ssh to an untrusted host? - Information Security Stack Exchange
ssh - What are the risks of SSHing to an untrusted host? - Information Security Stack Exchange
Why would a remote desktop connection harm my PC? RDP risks - RDP security - Information Security Stack Exchange
windows - RDP vs. VNC when looking them from security side - Information Security Stack Exchange
Breaking out of a restricted RDP session - wicked clown - rdp security
remote desktop - What is considered an acceptable, secure method of remotely connecting to a Linux system? vnc security, x11forwarding - nomachine - vnc - x11 - Information Security Stack Exchange
hash - How does the attacker know what algorithm and salt to use in a dictionary attack? determine hashing algorithm - Information Security Stack Exchange
lattera/glibc - crypt(3) UFC Ultra Fast Crypt implementation - GitHub
Creating a Completely Tor-ified Home Network
One Week With Tor - miscellaneous considerations
A Beginner's Guide To OPSEC Operational Security - Physical Location, Securing your network, purchasing equipment, developing an alternate persona, personal phone privacy, keeping anonymity throughout attack
Simple Mail Transfer Protocol - SMTP -Wikipedia
Setting up an MTA Behind Tor - Message Transfer Agent - opensmtpd
The Importance of Exploit Mitigations
Thoughts on the BTB Paper - Branch Target Buffer - side-channel attacks
Flashing the BIOS on the PC Engines APU4c4
Jailing The bhyve Hypervisor
Full Disclosure Versus Responsible Disclosure
TCP stream analysis tool for detecting and recording TCP injection attacks
The HardenedBSD Project - Security-focused and hardened FreeBSD derivative
Phreaking - phone hacking - H/P Culture Hacking/Phreaking Wikipedia
virus - Is malware distributed with pirated software actually common? crack keygen - spread, distribution - Information Security Stack Exchange
Are keyGens viruses or not? malware : Piracy
Do anti-virus companies report false positives to prevent cracks and keygens from working? malware - Quora
How to make sure a crack/Keygen isn't actually a virus? malware : Piracy
Do cracked games contain viruses? malware - Quora
How does the crack of a PC game/software work? - Quora
security - How would I write a malware detection software? - Stack Overflow
privacy - Can 'cracked' product keys harm the user in any way? - Information Security Stack Exchange
Near field communication overview  | NFC - Android Developers
Writing udev rules - userspace /dev
Dalvik Debug Monitor Server - ddms - deprecated - alternatives : android profiler
Debug Decompiled Smali Code in Android Studio 3.2 - uptodate definitive guide - adb port forwarding - jdwp · malacupa.com
Android Command Line Reverse Shell in Java · malacupa.com
Manually Signing the APK - Xamarin | Microsoft Docs
Java Platform Debugger Architecture - Java Debug Wire Protocol (JDWP) - android studio app debugging - smalidea -Wikipedia
Shrink your code and resources  | ProGuard obfuscation  - Android Developers
What Is NXDOMAIN? Non-Existant Domain - DNS Hijacking
How do I get my android device detected by ADB on Linux? definitive answer - /etc/udev/rules.d/51-android.rules file - plugdev androiddev groups - Android Enthusiasts Stack Exchange
login.defs(5) - shadow password suite configuration, related to crypt(3) - /etc/login.defs used in relation with /etc/shadow - Linux manual page
string - Base64 length calculation? - Stack Overflow
Base64 Encoding: A Visual Explanation - definitive explanation - Lucidchart
Cover Story: Understanding Base64 Encoding
Base64 Explained | definitive guide - Oracle Ramkumar Menon's Blog
Base What? A Practical Introduction to Base Encoding - definitive comparison - base2, base16, base32, base64, ascii
algorithm - Why do we use Base64? base64 necessity - historical/technical reason - vs ascii - Stack Overflow
Understanding Base64 Data - Developer.com
SecureRandom (Java Platform SE 6) - cryptographically strong random number generator (RNG)
Linux / UNIX: Generating Random Password With mkpasswd / makepasswd / pwgen - nixCraft
hash - When hashing passwords, is it ok to use the hashed password as the salt? - Information Security Stack Exchange
passwords - Do salts have to be random, or just unique and unknown? definitive answers about salt characteristics - random salt generation - Information Security Stack Exchange
Rainbow table - precomputation attack - precomputed table - Wikipedia
git - How do I show the changes which have been staged? - diff - Stack Overflow
How to Manage 'Systemd' Services and Units Using 'Systemctl' in Linux
SysVinit to Systemd Cheatsheet - Fedora Project Wiki
Pointers Basics and Pass-By-Address
passwords - Why is using salt more secure? - rainbow table - Information Security Stack Exchange
SELinux Memory Protection Tests
Recommendation for password-based key derivation: part 1: storage applications - password hashing function - salt, iteration count = rounds number, pbkdf, derived master key, salt length - nistspecialpublication800-132.pdf
hash - Is my developer's home-brew password security right or wrong, and why? - advantages of public cryptographic protocol - pitfalls of security through obscurity - Information Security Stack Exchange
authentication - Why is it always `HASH( salt + password )` that we recommend? - hashing scheme - Information Security Stack Exchange
Random oracle - cryptographic hash function - black box - Church-Turing function - post-quantum cryptography - Wikipedia
Definitive Outline of cryptography - categories - cryptanalysis - Indistinguishability obfuscation - list of topics - ciphers
https://akkadia.org/drepper/SHA-crypt.txt - linux crypt(3) specifications
x86-opcode-structure.pdf
Userlevel IPv6 C Programming Introduction
Static Linking Considered Harmful - vs dynamic linking - libraries - dso dynamic shared objects - security considerations
dynamic shared object vs library at DuckDuckGo
cryptography - What's the practical limit for rainbow-table based bruteforce? - Information Security Stack Exchange
Cryptographically secure pseudorandom number generator - CSPRNG/CPRNG - Wikipedia
randomness - What is the difference between CSPRNG and PRNG? secure pseudorandomness - Cryptography Stack Exchange
java - Base64 vs HEX for sending binary content over the internet in XML doc - vs hexadecimal base16Stack Overflow
Modified Base 32 - Douglas crockford
How to Digitally Erase All Your Stuff When You Quit Your Job | secure deletion - WIRED
Leaving Your Job? Take Your Data With You | secure deletion - PCWorld
Data Removal: Darik's Boot and Nuke - DBAN - secure deletion software
How to Truly Delete Everything When You Quit | secure deletion - Digital Care
The Developer's Quitting Your Job Technology Checklist - secure deletion - Scott Hanselman
Creating Strong Passwords - strength - Multi-Factor Authentication and One-Time Passwords - Dice | Surveillance Self-Defense
How to: Use PGP for Linux | Pretty Good Privacy - Surveillance Self-Defense
Pretty Good Privacy - PGP - Wikipedia
Email Encryption Showdown: SMTP TLS vs PGP vs S/MIME vs Portal Pickup - web of trust - LuxSci
8 Best Most Secure Browsers For Your Online Privacy | privact-respectuous browser BEencrypted - 2019
How can Google Track You and How to Prevent Google Tracking? | maps, android - Beencrypted
8 Best WordPress Security Plugins For Top Security | Beencrypted
What Does Incognito Mean - What Is Private Browsing - firefox, chrome, explorer - Beencrypted
How Can Your USB Device Pose Security Risks to You | Beencrypted
AES vs PGP: What is the Difference?
What are digital traces? content and metadata | Me and my Shadow
How to Permanently Delete Files On Windows & Linux - secure deletion
users - How to enable root login? - drawbacks - Ask Ubuntu
How to secure your Linux system: Securely delete files and browse anonymously | secure deletion - TechRadar
shred-tip-securely-remove-multiple-files-so-no-one-can-recover-file-again.html - secure deletion -
Securely Erasing Partitions - secure deletion - shred - scrub - dd - SUSE Communities
Secure Deletion for a Versioning File System - pdf
Securely wipe disk - dd, wipe, shred , badblocks, hdparm - ArchWiki
/dev/zero - dd usage - null characters stream - device file
devices - Difference between /dev/null and /dev/zero - Unix & Linux Stack Exchange
linux - Does filling up disk with dd removes files securely? secure deletion - number of passes - Server Fault
dd is a great tool to fully wipe out your disk data to forensic levels - secure deletion - dd /dev/zero : linux
secure data deletion - SoK - pdf
linux - How to shred already removed file on modern filesystem? (randomize free space, journal, tails, ... securely) - secure deletion - definitive answer - Super User
ubuntu - How to wipe free disk space in Linux? secure deletion - making deleted files unrecoverable - definitive answers - Super User
security - How to delete file(s) in secure manner? - secure deletion - definitive answer - srm, shred, FDE cryptoshredding - SSD, hdparam, secure erasure feature - bleachbit - Ask Ubuntu
Delete files on Linux securely | shred usage - secure deletion - Split Horizon
security - Securely Deleting Files on Linux Journaled Filesystem - secure security - Server Fault
eWON Cosy - Industrial VPN Routers for Easy and Secure Remote Access
Securing Remote Desktop (RDP) for System Administrators | Information Security and Policy
AnyDesk User? Your Team Member IP Address Can Easily Be Sniffed - security risk remote connection
AnyDesk - remote desktop tool - Wikipedia
UDP hole punching - NAT - Wikipedia
network - Is indirect access to a computer as bad as direct? - ssh key authentication vs password authentication - Information Security Stack Exchange
network - How secure is TeamViewer for simple remote support? vs vnc - Information Security Stack Exchange
TeamViewer - Encryption and security features - Wikipedia
How to replace local branch with remote branch entirely in Git? - ignore divergent branch - Stack Overflow
Where do files go when the rm command is issued? dat deletion - data recovery - Unix & Linux Stack Exchange
How Does File Deletion work in Linux - inode
inode and its structure in linux - definitive explanation
File recovery - Linux - ArchWiki
Point Software AG - ext3 vs ext4
Linux File Systems: Ext2 vs Ext3 vs Ext4
ext4 - Fourth Extended Filesystem - Wikipedia
Which Linux File System Should You Use? ext vs ext2 vs ext3 vs ext4 vs btrFS vs ReiserFS vs ZFS vs XFS vs JFS vs Swapvs FAT16,FAT32,exFAT - What Is Journaling? - good explanation of filesystem's journal
What’s the Difference Between FAT32, exFAT, and NTFS? definitive comparison
What Is a File System, and Why Are There So Many of Them?
Beginner Geek: Hard Disk Partitions Explained
Flash file system - linux - Wikipedia
linux - Where are inodes stored at? inode storage - Stack Overflow
The inode structure and inode table in linux
Indicator of compromise - IOC - Wikipedia
Buffer_Overflow - Stack Buffer Overflow - pdf
SmartPhone Security - 2012 .pdf
Vulnerability - stack buffer overflow, heap buffer overflow, race condition, input validation, format string, miscellaneous vulnerabilities
Race_Condition - Race_Condition.pdf
Sandboxing approaches - VM Virtual Machine, Chroot, soft link, hard link, freebsd jail, janus, ptrace PTRACE_TRACEME/PTRACE_ATTACH, /proc, library interposition, LD_PRELOAD - soft link vs hard link
Kinds of Malicious Code - examples of malwares - trojan horse, virus, logic bomb, time bomb, trapdoor, backdoor, worm
Security Overview - risks and defending measures
MAC - mandatory access control - multilevel security - mutilateral security - windows implementation - selinux, apparmor,
Format String vulnerbaility
DNS Protocol and Attacks
Capability - linux capabilities
How To Write a Setuid Program - 1987
Unix_Security_Overview
Sandbox implemntation diagram
Sandboxing Applications
setuid - definitive checklist for security of setuid program development - general considerations of security when writing a setuid program
Role-Based Access Control (RBAC) - sudo pdf
File attribute - chattr, lsattr - Wikipedia
x86 - 80386 Protection Mode - security - kernel rings - definitive guide of CPU hardware level access control implementation
Access_Control.pdf
x86 - 80386 Programmer's Reference Manual -- Table of Contents
Capability-Based Computer Systems - capabilities
Internet Security course
Internet Security labs - challenges
Computer Security - labs - challenges
Meltdown Attack Lab
Spectre Attack Lab
Welcome to Terminator’s documentation! — Terminator 2.0 alpha documentation
Tor Project: Verifying Signatures - PGP - GPG
EnvironmentVariables - starting order of system processes - - .bashrc, .bash_profile - login/non-login shell - Debian Wiki
How do I 'overwrite', rather than 'merge', a branch on another branch in Git? - Stack Overflow
file permissions - How to read the mode field of git-ls-tree's output - create mode output in git - git files format - unix permissions - octals meaning - definitive - git cache.h
SUID and SGID in Linux Explained With Examples
How to use special permissions: the setuid, setgid and sticky bits - LinuxConfig.org
Chapter 7. Process Environment - memory layout, environment variables - exit, atexit - malloc alternatives, free, sbrk - definitive course - Shichao's Notes
linux - Where is the environment string actual stored? in memory - Unix & Linux Stack Exchange
Technique: Setuid and Setgid - vs sudoers file - MITRE ATT&CK™
Linux file access permissions reference - sudo -s - sudoers - inodes, chmod - setuid, setgid, sticky bit security concerns, passwd access to /etc/shadow - file deletion permission - umask - Linux tutorial from PenguinTutor
Where does UNIX store open file offsets, permissions, and list of names/links for each file? file metadata storage - file description table, file descriptor - Stack Overflow
linux - Where does metadata go when you save a file? file metadata (attributes, permissions) storage in filesystem - stat command - Super User
architecture - How do file permissions/attributes work? Kernel-level, FS-level or both? file metadata (attributes, permissions) storage in filesystem - internally -
Alternatives To MVC | Model View Controller - ircmaxell's Blog
linux - SUID not used after exploit - shell drops privileges after launch - Information Security Stack Exchange
linux - Debugging SUID for privilege escalation - ptrace, kernel.yama.ptrace_scope, attaching to child processes - debug a program that runs with elevated privileges - Information Security Stack Exchange
access control - SUID exploit and patch - running program through sudo vs suid -Information Security Stack Exchange
privilege escalation - android apk and suid binary - Zygote process - suid - Information Security Stack Exchange
linux - own question - Using SUID program to avoid having entries in sudoers - suid root wrapper - dpkg custom root - Information Security Stack Exchange
linux - Should I be concerned if the "FBI" has logged onto my Ubuntu VPS? - reverse DNS hostname spoofing - Information Security Stack Exchange
hacking - How do I deal with a compromised server? - Server Fault
malware - How do you explain the necessity of "nuke it from orbit" to management and users after malware infection ? - Information Security Stack Exchange
Patch (computing) - security patches - Wikipedia
Cryptography that looks like ordinary email - make your encrypted email look like spam - anonymity/privacy -Information Security Stack Exchange
operating systems - exploiting setuid and setgid bit - ping using of setuid for ICMP communication - Information Security Stack Exchange
filesystems - How does the sticky bit work? confusion suid vs sticky bit - definitive practical answer - Unix & Linux Stack Exchange
linux - what does it mean to be setuid root? good answer - suid vs capabilities - Information Security Stack Exchange
Read–eval–print loop - REPL - Wikipedia
A Crash Course in C and x86 Assembly - hacking challenge
KISS principle - keep it simple, stupid - Wikipedia
What is Computer Security? General Principles - Fallacies, Threat Modeling, Multilevel Security - MAC/DAC/RBAC, Secure Coding/Hard−to−Track Information Flow -
OS Security - General Principles - Process isolation, CPU Rings of Protection/x86 rings, context switch, Kernel private memory, OS/Kernel Exploits, IPC Exploitation, least privilege, defense in depth, Acces Control Models/ACL/Capabilities, Linux/Windows Control Lists, setuid/setgid/sticky bit -
Exploitation examples - Access Control, setuid, /etc/shadow, /etc/passwd, /usr/bin/passwd, Privilege Escalation, setgid/SGID exploitation, sticky bit exploitation, dumpster diving
Symmetric Cryptography
1Digital Signatures - Public Key Cryptography
Hash & RSA Vulnerabilities - Brute Force Hash Attack - Pre-Image vs. Collision Resistance - RSA Attacks : Common Modulus Attack/Low Encryption Exponent Attack/Low Decryption Attack/Timing Attack
Protocols and An Introduction To Authentication - authentication factors, biometric, zero-knowledge authentication
Handshake Protocols - ISO SC27, Asymmetry Foils Replay Attack, One-Way/Two-Ways-Mutual Authentication, Challenge-Response Attacks : MITM, Known PLaintext, Chosen PLaintext, Session Hijacking, Shared-Secret Vulnerability, Predictable Nonce, Foiling Replay Attack OTP/One-Time Password (Tokens/RSA SecurID, Iterated Hashing), Password Aging, Replay Attack, Password Interception,
How to build an insecure system out of perfectly good cryptography (Dr. Radia Perlman) - YouTube
Key Exchange in Cryptography - Key Distribution Center/KDC, Kerberos Structure (Ticket-Granting Tickets TGT) , KDC Networks, Diffie-Hellman Key Exchange
Public Key Infrastructure (PKI) - Diffie-Hellman, Certification Authority/CA, vs PGP
Code Exploits Samples - definitive course - erickson's HTAOE - Overwriting the Return Pointer - Shellcode Invoking In C : setreuid()/suid - Shellcode Implementation in Assembly/Binary in .text Segment - overflow exploit - code injection exploits difficulties - Preventing Overflow-like Exploits
Introduction toComputer Networking - security
More Networking andSome Network Vulnerabilities
Network Attacks and Defenses
Malware : vs Viruses - taxonomy - definitive table
Malware : worms
Resources for Electronic Voting Discussion - voting machine security
Hacking Tutorial - challenge - printf exploitation - stack hacking
Hacking Problem Set 1 - challenges
Hacking Problem Set 2 - challenges
Hacking Problem Set 3 - challenges
Hacking Problem Set 4 - challenges
Internet Storm Center - Vulnerability Reporting List - SANS Internet Storm Center
Opinion | Our Cellphones Aren’t Safe - mobile security - SS7 - The New York Times
Vulnerabilties Reporting List - RISKS-LIST: RISKS-FORUM Digest
Using Memory Errors to Attack a Virtual Machine - vm security
Voting Machines Security - e-vote
sysadmin - Best practice to run Linux service as a different user - Stack Overflow
linux - How can utilities with setuid set to root be secure if they are debuggable? debugging setuid root program - Information Security Stack Exchange
Privilege Escalation: C functions setuid(0) with system() not working in Linux - vulnerable code sample setuid/suid root vulnerable - Information Security Stack Exchange
Why Bash is like that: suid – bash security/hardening against setuid/suid programsVidar’s Blog
malware - Is there any way to block LD_PRELOAD and LD_LIBRARY_PATH on Linux? - Information Security Stack Exchange
Why was the NX bit unable to stop WannaCry? - Information Security Stack Exchange
Bypassing NX bit using return-to-libc – sploitF-U-N
How To Bypass Non Executable Stack (NX) | Buffer Overflows
bash - Does shellshock produce a comprehensive local privilege escalation vector? setuid/suid - Information Security Stack Exchange
root access - What exactly is superuser.apk and su? rooting - Android Enthusiasts Stack Exchange
linux - Is there a list of safe/normal/expected SUID files? unix local privilege escalation, setuid files listing, local enumeration - Information Security Stack Exchange
linux - Binary Exploitation - How to set GID of a SUID binary using shellcode? setgid, capabilities, CAP_SETGID - Information Security Stack Exchange
shellcode - Program getting exploited inside gdb, new shell is spawned but terminated immediately - debugging suid/setuid program - Information Security Stack Exchange
InfoSec Handlers Diary Blog - A new fascinating Linux kernel vulnerability - page zero vulnerability
appsec - security implications of NULL dereference - kernel vulnerability, page zero vulnerbaility, Information Security Stack Exchange
php - Is the following setuid program a security risk? privilege escalation - Server Fault
scripting - Allow setuid on shell scripts - problems with setuid/SUID shell scripts - Unix & Linux Stack Exchange
elf - How to exploit an suid root application - PATH environment variable hijacking - command injection - Reverse Engineering Stack Exchange
Shellcodes database for study cases
c - Debugging a setuid program / "Permission denied" with setuid - Stack Overflow
c - setreuid call fails to re-establish process permissions - setuid/suid dropping privileges - Stack Overflow
command line - What do the different colors mean in ls output? - Ask Ubuntu
Exploiting SETUID/SUID and SETGID/SGID binaries - finding setuid programs - local enumeration
OSCP Review - Labs/Courses - Preparation - Passing the Exam
7. SECURING AND MONITORING KALI Linux - Hardening
setuid/SUID vs Capabilities - definitive comparison - capabilities storage on block device - nosuid filesystem option - Using rsync or tar with saving capabilities
Grsecurity/Appendix/Capability Names and Descriptions - Wikibooks, open books for an open world - capabilities list
Linux Capabilities - FAQ
Running nmap as an unprivileged user - with capabilities - without sudo
How are setuid vs suid vs nosuid vs sudo vs su - all related? - Unix & Linux Stack Exchange
root - How do the internals of sudo work? setuid/suid - Unix & Linux Stack Exchange
linux - Understanding UNIX permissions and file types - setuid/suid, sgid, sticky bit, chmod forms - definitive breakdown - Unix & Linux Stack Exchange
Linux Capabilities: Hardening Linux binaries by removing setuid - ping example -
Linux Security - Hardening - Linux Audit
Configure the minimum password length on Linux systems - password strength - PAM - Linux Audit
linux - How to replace setuid/suid with file-system capabilities - Unix & Linux Stack Exchange
Stracing su and ssh shows the password. Is this a security flaw or am I missing something? ptrace process exploitation - Unix & Linux Stack Exchange
APT (Debian) - Advanced Packaging Tool - Wikipedia
Capsicum: practical capabilities for UNIX
How are setuid vs suid vs nosuid vs sudo vs su - all related? - Unix & Linux Stack Exchange
pushd and popd - Wikipedia
linux - What does a + mean at the end of the permissions from ls -l? plus symbol, ACL Access Control Lists, mounted external drives' permissions - Server Fault
Three Tools to Scan a Linux Server for Viruses, Malware and Rootkits - chkrootkit vs lynis vs ISPProtect
Linux Malware Detect – LMD - R-fx Networks
Debian Package of the Day (static archived copy) » Blog Archive » rkhunter vs chkrootkit: wise crackers only
Clam AntiVirus - clamav - Wikipedia
How to ping a machine on different subnetworks - Quora
One-time pad - Vernam Cipher - CSPRNG
One-time password - OTP - Wikipedia
The Mathematical Trick That Helped Smash The Record For The Largest Number Ever Factorised By Quantum Computer - factorisation problem
Spintronics - spin transport electronics - quantum computers/chip - Wikipedia
linux - Why are people saying that the X Window System is not secure? - Information Security Stack Exchange
SHA-2 - built using the Merkle–Damgård structure, from a one-way compression function itself built using the Davies–Meyer structure from a (classified) specialized block cipher - cryptanalysis
SHA-3 - vs MD5, SHA-1, SHA-2 - Keccak cryptographic primitive - sponge construction - cryptanalysis - Security against structured preimage quantum attacks
Kernel Hacking Guides — kernel programming - The Linux Kernel documentation
ext4 Data Structures and Algorithms — The Linux Kernel documentation
Credentials in Linux — setuid/suid - The Linux Kernel documentation
Linux Tracing Technologies — hooking - The Linux Kernel documentation
Linux Networking Documentation — The Linux Kernel documentation
Linux GPU Driver Developer’s Guide — The Linux Kernel documentation
Linux Kernel Crypto API — cryptoraphic primitives - The Linux Kernel documentation
Kernel module signing facility — kernel security - The Linux Kernel documentation
Security bugs — CVE kernel vulnerabilities - The Linux Kernel documentation
Bug hunting — Debugging the kernel - kernel programming - The Linux Kernel documentation
Linux Security Module Usage -- LSMs - AppArmor, LoadPin, SELinux, Smack, TOMOYO, Yama, SafeSetID — The Linux Kernel documentation
Memory Management - process page tables, numa, memory hotplug, — The Linux Kernel documentation
Development tools for the kernel - kernel programming — The Linux Kernel documentation
Linux List All Users In The System - user management - definitive guide - /sbin/nologin - /etc/passwd - nixCraft
Difference between Fast Encryption and Full Device Encryption - Computers |cold boot ram forensics - Serpent-Twofish-AES with Whirlpool Hash - Android Forums
Exploiting Concurrency Vulnerabilities in System Call Wrappers - data race security
Secure Programming with r C, C++, Java, Perl, PHP, Python, Tcl, and Ada95 - HOWTO -- secure open source code from malicious code, backdoors, trojans
GitHub - AliasIO/Wappalyzer: Cross-platform utility that uncovers the technologies used on websites -- source code
Run levels - /etc/rc6.d
Linux Changing Run Levels - nixCraft
Debian and Ubuntu Linux Run Levels | Debian Admin
How To Format Date For Display or Use In a Shell Script - nixCraft
Attribute-based access control - ABAC - Wikipedia
Context-based access control - CBAC - Wikipedia
Graph-based access control - GBAC- Wikipedia
Lattice-based access control - LBAC - Wikipedia
Organisation-based access control - OrBAC - Wikipedia
Location-based authentication - Wikipedia
Risk-based authentication - Wikipedia
XACML - eXtensible Access Control Markup Language - Wikipedia
Pluggable Authentication Modules (PAM) - Practical UNIX and Internet Security, 3rd Edition [Book]
Authentication methods in UNIX - definitive guide - PAM (Pluggable Authentication Modules) - /etc/passwd, /etc/shadow formats, /etc/group, /etc/gshadow - creating encryption-hashed passwords whois mkpasswd / openssl passwd - NSS Name Service Switch - LDAP, pam_ldap - authentication hardening - libpam-cracklib - sudo, sudoers- PolicyKit, SELinux - secure password on internet - brute-force password attack mitigation knockd, fail2ban, libpam-shield - securing root password against cracking methods, booting from removable media, root partition encryption dm-crypt / initramfs
Data encryption tips - GPG, dm-crypt, eCryptfs, cryptsetup, cryptmount, ecryptfs-utils, LUKS - swap partition encryption
How to enforce password complexity/strength on Linux | authentication hardening - cracklib, /etc/login.defs - /etc/pam.d/system-auth on Red Hat, /etc/pam.d/common-password on debian Network World
The Linux-PAM System Administrators' Guide - definitive guide - pluggable authentication modules - Linux-PAM library
The Linux-PAM Module Writers' Guide - definitive guide - pluggable authentication modules - Linux-PAM library
The Linux-PAM Application Developers' Guide - definitive guide - pluggable authentication modules - Linux-PAM library
Why should I hash passwords? - Information Security Stack Exchange
cryptography - Why is password hashing considered so important? - Information Security Stack Exchange
encryption - Why are hash functions one way? If I know the algorithm, why can't I calculate the input from it? Cryptographic hashing functions basics definitive answers - Information Security Stack Exchange
hash - What is a good analogy to explain to a layman why passwords should be hashed? argument to convince management about security measures - Information Security Stack Exchange
Security Guide - Red Hat Linux Hardening
How to make user passwords shown as a clear text in Linux? /etc/passwd, /etc/shadow, /root/passwords - Unix & Linux Stack Exchange
Managing Single Sign-On and Smart Cards - Using Pluggable Authentication Modules (PAM) definitive guide - Red Hat Customer Portal
Understanding PAM Configuration files | Linux.com | The source for Linux information
RUID vs EUID - Difference between owner/root and RUID/EUID - definitive answer - Real User Identifier vs Effective User Identifier vs setuid - passwd command example - Unix & Linux Stack Exchange
Sandbox (computer security) - SFI Software Fault Isolation - Wikipedia
Attacks on Package Managers
GitHub - anthraxx/linux-hardened: basic kernel hardening patch set - Minimal supplement to upstream Kernel Self Protection Project changes. Features already provided by SELinux + Yama and archs other than multiarch arm64 / x86_64 aren't in scope. Only tags have stable history. Shared IRC channel with KSPP: irc.freenode.net ##linux-hardened
OpenSSH - config and security guide - ArchWiki
SELinux - Security-Enhanced Linux - Hardening - MAC - Use Vagrant to provision a virtual Arch Linux machine with SELinux configured. This is a convenient way to test an Arch Linux system running SELinux without modifying a current system - ArchWiki
linux - Unix execute permission can be easily bypassed. Is it superfluous, or what's the intention behind it? bypssing x permission , setuid bit usefulness - Information Security Stack Exchange
File Permissions mode ending in @ or + symbols - ACL, extended attributes - Unix & Linux Stack Exchange
linux - How do file permissions work for the "root" user? capabilities CAP_DAC_OVERRIDE, CAP_SETUID - Unix & Linux Stack Exchange
Hack the Box (HTB) Machines Walkthrough Series - challenges writeups — Active
Why isn't this XSS working? DOM Document Object Model XSS - Information Security Stack Exchange
Security Onion OS - Ubuntu-based linux distribution shipped with layers of security
Security Onion OS -- Security Onion is a free and open source Linux distribution for intrusion detection, enterprise security monitoring, and log management. It includes Elasticsearch, Logstash, Kibana, Snort, Suricata, Bro, Wazuh, Sguil, Squert, CyberChef, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes!
Cyclotomic polynomial - Wikipedia
Circular buffer = ring buffer = circular queue = cyclic buffer - Wikipedia
Implementing Circular Buffer in Embedded C - EmbedJournal
Sexagesimal - base/radix 60 - Babylonian Mathematics - Wikipedia
Number of Decimal Digits In a Binary Integer - Exploring Binary
Is floating point math broken? Floating-point arithmetic - Stack Overflow
Password hashing functions - crypt, MD5, PBKDF2, SHA-1, Salted SHA-1, SHA-2, Salted SHA-2
Cleartext Passwords in Linux Memory -- SSH, Truecrypt, email, IM and root passwords - physical / cold boot attacks - cleartext passwords in swap space forensics -- 2008
encryption - Where do I securely store application-specific symmetric key? secure key/password storage, TPM / HSM, Windows Data Protection API DPAPI - Information Security Stack Exchange
Radare2 cheat sheets - Boogy's Place
Using radare2 to pwn things · The Official Radare Blog
The Official Radare Blog · The Official Radare Blog - r2, Radare2
MITRE ATT&CK and the Unified Kill Chain | Introduction to MITRE's cyberattacks knowledge base
deletion - What can be recovered? Securely deleted files - definitive answer - cryptoshredding, cryptographic secure deletion/erasure ie full disk encryption and private key dismissal - magnetic disk vs SSD vs HDD - Information Security Stack Exchange
Data erasure - secure deletion - disk sanitization - crypto-shredding - Self-Encrypting Drives SED - Wikipedia
Data recovery - secure deletion - Wikipedia
Crypto-shredding - secure deletion - TPM/HSM for secure key storage and destruction - Wikipedia
Undeletion - secure deletion - Wikipedia
Volatile Memory Forensics: A Legal Perspective
Finding Digital Evidence in Physical Memory -- anti-forensics Hacker Defender/Antidetection,FU/Shadow Walker - witty worm
Witty (computer worm) - Wikipedia -- 2004
Why ptrace doesn't attach to process after setuid? prctl(PR_SET_DUMPABLE,1) - Stack Overflow
Random-access machine - RAM - vs Random Access Memory Wikipedia
What's the difference between "git reset" and "git checkout"? - Stack Overflow
c++ - Programmatically detect CPU architecture at runtime - Stack Overflow
x86 - Determine 32/64 bit architecture in assembly - Stack Overflow
c - How do you detect the CPU architecture type during run-time with GCC and inline asm? - Stack Overflow
64bit - Difference between x86, x32, and x64 architectures? - Stack Overflow
New update need new permissions: Store unlimited amounts of client side data : uBlockOrigin - firefox addon audit
Bypass Antivirus Dynamic Analysis
peCloak.py - An Experiment in AntiVirus Evasion - Security SiftSecurity Sift
GitHub - govolution/avet: AntiVirus Evasion Tool
GitHub - trustedsec/unicorn: Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18. - antivirus evasion
Antivirus Evasion for Penetration Testing Engagements | AT&T Cybersecurity
Buffer Overflows - Integer Overflow - format string vulnerabilities - OWASP
Does Java have buffer overflows? - Stack Overflow
Buffer Overflow – CS0 – Java - code example
Buffer Overflow – CS2 – Java - code example, example of occurence
exploit - Vulnerability exploitation in Java - Information Security Stack Exchange
Buffer Overflow Attack with Example - GeeksforGeeks
How to Detect, Prevent, and Mitigate Buffer Overflow Attacks - DZone Security
Exploiting Memory Corruption Vulnerabilities in the Java Runtime - JRE, JVM hacking
Basic Integer Overflows - widthness overflows, arithmetic overflows, signedness bugs, code examples
software installation - How can I install a package without root access? dpkg custom root directory - package management without superprivleges - definitive answer - Ask Ubuntu
A Battle Against Android Malware - Artificial Intelligence-Based Password Brute Force Attacks - Evolution of Ransomware - A Machine Learning Driven IoT Solution for Noise Classification in Smart Cities - Hadoop VS Spark - Hakin9 - IT Security Magazine
Signed versus unsigned integers « Stack Overflow
Why Linux Doesn’t Need Defragmenting
EEPROM Wear Leveling « Stack Overflow
Shifting Styles « Stack Overflow
unix - Change ownership of file during copy - rsync linux command - Stack Overflow
malware - Is it ever safe to open a suspicious HTML file (e.g. email attachment)? spray-n-pray attack, ASLR, Executable space protection - Information Security Stack Exchange
Cryptojacking and the rise of "spray and pray", cryptojacking - Terrance DeJesus
Spambot Targets WordPress with Spray and Pray - Infosecurity Magazine
The Bitcoin Lightning Network Explained | Toptal
What mechanism enforces user permissions in Unix/Linux? ACLs, filesystem, inodes - Information Security Stack Exchange
linux - Is installing Debian package safe? apt security - Information Security Stack Exchange
key management - Where to store a server side encryption key? secure password/key storage, HSM - Information Security Stack Exchange
SILT: A Memory-Efficient, High-Performance Key-Value Store - map storage, HashStore - silt-sosp2011.pdf
virtual/software RAM drive - ramdisk - vs hardware
Android Secure Storage - definitive paper - Filesystem layout on Android vs Linux /data, /data/data, /sdcard, /storage/emulated/legacy, ARM TrustZone Technology, hardware separation, trustlets, secure world OS, communnication bus security bit, AXI-bus, SoC System on Chip, Trusted Execution Environment TEE, Attacker models malcious app attacker, root attacker, intercepting root attacker, Secure Key Storage solutions bouncy castle, AndroidKeyStore on Qualcomm devices, recommendations
Trusted system - Wikipedia
Trusted Computing - TPMs, use in U.S Army, criticism, dangers, privacy/anonymity loss, DRM - Endorsement key, Memory curtaining, sealed storage, remote attestation, trusted third party - Wikipedia
Trusted Platform Module - TPM, ISO/IEC 11889 - Cryptographic processor : Random Number Generator RNG, RSA key generator, SHA hash generator, encryption/decryption signature engine - Persistent memory: Endorsement Key EK, Storage Root Key SRK - Versatile Memory: Platform Configuration Registers PCR, Attestation Identity Keys AIK, Storage Keys - provide integrity authentication for a trusted boot pathway that includes firmware and boot sector - TrueCrypt/veraCrypt Criticisms - Wikipedia
FIPS 140-2 - Current publication
FIPS 140 - Federal Information Processing Standards specifying requirements for cryptographic modules - NIST - Wikipedia
Power analysis - side channel attack variant - Wikipedia
xss - How badly should I try to prevent a user from XSSing themselves? Self-XSS scam - Information Security Stack Exchange
Web Application encryption key management - secure key/password storage - Information Security Stack Exchange
privacy - Where do you store your personal private GPG key? secure key/password storage - Information Security Stack Exchange
Hardware security - HSM, PUF - Wikipedia
Disclosing Secrets Algorithms from Hardware - Hardware Security - Microchips Basics, protection modes, proprietary encryption Reverse Engineering , RFID Tags, OpenPCD +PICC, RNG, Secure Key Storage, Key Vault, HSM/Secure Access Modules SAM, Key Diversification,
Secure access module - SAM - EMV, SmartCards, HVQFN, Wikipedia
DEF CON 20 - Chris Tarnovsky - Attacking TPM Part 2 A Look at the ST19WP18 TPM Device - Hardware Security - YouTube
Deconstructing a Secure Processor - YouTube - Tarnovsky
Security Analysisof a Widely Deployed Electronic Locking System - Lock Security
Hardware Reverse Engineering: Access, Analyze, & Defeat - Hardware Reverse Engineering_ Access, Analyze, & Defeat - Hardware Security
Hardware is the New Software - Hardware Security
Reverse engineering integrated circuits with degate - Hardware IoT Security - Home
Physical unclonable function - PUF - Wikipedia
QR code - Quick Response Code - Wikipedia
filesystems - Where is the name of a file stored in the file system? inodes - Server Fault
Disk encryption hardware - Wikipedia
How to nuke your encrypted Kali install - cryptoshredding | Kali Linux
Web shell - remote access trojan - SQLi, RFI, LFI, XSS - Wikipedia
How to use a reverse shell in Metasploit - bind shell vs reverse shell · rapid7/metasploit-framework Wiki · GitHub
Metasploit Project - Wikipedia
Exploit kit - Wikipedia
Crimeware - class of malware - Wikipedia
w3af - (web application attack and audit framework) is an open-source web application security scanner - Wikipedia
initramfs - Debian Wiki
About initramfs
Initramfs detailed description - Ubuntu Wiki
linux - How to find out which interface am I using for connecting to the internet? - Unix & Linux Stack Exchange
Known-plaintext attack - Wikipedia
Chosen-ciphertext attack - Wikipedia
Adaptive chosen-ciphertext attack - Wikipedia
Related-key attack - Wikipedia
Custom Initramfs - vs initrd - definitive guide - Gentoo Wiki
https://www.kernel.org/doc/Documentation/x86/boot.txt - communication between kernel and bootloader
Cloud access security broker - CASB - Wikipedia
boot loader - How is a Linux kernel capable of accessing its assigned initramfs/initrd? - Unix & Linux Stack Exchange
Microservice Math: Auto-scaling Container Orchestration | Toptal
Understanding the Risks and Benefits of Software Containers | Toptal
What is Kubernetes? Guide to Containers and Deployment | Toptal
Dropwizard Microservices Tutorial | Toptal
Guide How to Setup a Microservices Architecture | Toptal
factoring - What is the fastest integer factorization to break RSA? RSA Attack, Integer Factorization Problem - Cryptography Stack Exchange
malware - Can a virus destroy the BIOS of a modern computer? Bootloader/BIOS/UEFI attacks - Information Security Stack Exchange
chosen plaintext attack - Is it possible to mathematically extract an AES key from black-box encrypt/decrypt hardware? - Cryptography Stack Exchange
Padding oracle attack - Wikipedia
Lucky Thirteen attack - TLS attack - Wikipedia
c++ - How does the main() method work in C? main call in assembly, main args push on stack - definitive answer - Program Start up - _start() function - hosted vs non-hosted embedded environments - Stack Overflow
tls - Is Triple DES still considered safe to use? - Cryptography Stack Exchange
Why is writing your own encryption discouraged? - Cryptography Stack Exchange
"Schneier's Law" - rolling out own cryptography scheme - Quantum Cryptography criticism
Dream Market Shuts Down: Has the DEA Claimed Another Darknet Victim?
Exploiting IoT Devices (W44) - ARM exploitation - Hakin9 - IT Security Magazine
Initial Server Setup with Debian 8 - Grant Sudo Privileges to use, add ssh public key authentication, disable ssh root login - definitive guide | DigitalOcean
hardware - How can I reliably erase all information on a hard drive? secure deletion/erasure, NIST recommandations - Information Security Stack Exchange
If I shred /dev/sda, do I delete partitions? partprobe - Unix & Linux Stack Exchange
filesystem - How can I securely erase a hard drive? secure deletion/erasure - shred vs secure erase method, dd command, gutmann method, criticisms - Ask Ubuntu
DEFINITIVE - Reliably Erasing Data from Flash-Based Solid State Drives - secure deletion, SSD
Hard disk drive - HDD, hard disk, hard drive, fixed disk - externals - Wikipedia
disk - Is there any way of detecting if a drive is a SSD? - Stack Overflow
linux - How to know if a disk is an SSD or an HDD - cat /sys/block/sda/queue/rotational- Unix & Linux Stack Exchange
Which linux filesystem works best with SSD - performance, trim feature - Super User
Gutmann method - secure deletion/erasure - Wikipedia
Parallel ATA - ATA Secure Erase - Wikipedia
File deletion - Wikipedia
How to Create a Secure Encrypted USB Drive in Ubuntu with Linux Unified Key Setup
Delete files permanently with shred command in Linux – Remove absolutely – shred usage - If Not True Then False
security - How do I recursively shred an entire directory tree? secure deletion, shred weaknesses, disclaimer - Unix & Linux Stack Exchange
linux - zero fill vs random fill - /dev/zero vs /dev/urandom - Super User
deletion - Why is writing zeros (or random data) over a hard drive multiple times better than just doing it once? secure deletion, Peter Gutmann research - definitive answer with references - Information Security Stack Exchange
Overwriting Hard Drive Data - number of passes, NIST recommandations, misconceptions - definitive deeply technical explanation « SANS Computer Forensics, Investigation, and Response
hard disk - How to overwrite beginning of a device with random bits or zeros? secure deletion - /dev/urandom, dd - Unix & Linux Stack Exchange
Shredding files on Linux - wipe vs shred vs secure-delete | Network World
Wipe vs Shred vs Delete vs Erase: What's the Difference?
encryption - Fast Way to Randomize HardDrive? secure deletion - Unix & Linux Stack Exchange
linux - Is the shred utility always safe given a good random number generator? secure deletion - Server Fault
srm (Unix) - secure remove - Wikipedia
rm (Unix) - command - Wikipedia
data leakage - How do I securely erase USB flash drives? secure deletion - Information Security Stack Exchange
security - Why does everybody recommend Dban over more fundamental methods like dd, shred, wipe? secure deletion - Server Fault
ubuntu - How to wipe free disk space in Linux? secure deletion - HDD vs SSD - secure-delete srmn smem, sfill, sswap - Super User
Shred and secure-delete: tools for wiping files, partitions and disks in GNU/Linux - number of shred passes
How to delete the whole root with rm rf and shred together? secure deletion - Unix & Linux Stack Exchange
filesystems - Effectivity of shred on different file systems - vs encryption - secure deletion - Unix & Linux Stack Exchange
security - Shredding everything: files/folders and corresponding filenames - secure deletion/erasure - shred, /dev/*random - Unix & Linux Stack Exchange
3 simple ways to delete your data for good - secure deletion
gnome - Show address bar w. full path in Nautilus instead of breadcrumbs bar - gsettings entry - Unix & Linux Stack Exchange
What are the differences between gconf and dconf? - Ask Ubuntu
application development - When to use gconf vs dconf? - Ask Ubuntu
Basic CPU architecture – General Purpose Registers, Segment Registers, Flags, Endiannes Max Kersten
Procedure Call Standard for the ARM Architecture - Calling Conventions, ABI - IHI0042F_aapcs.pdf
x86 Disassembly/Calling Conventions - STDCALL, CDECL, and FASTCALL, THISCALL, Extern C - Wikibooks, open books for an open world
hash - Are hashing functions designed to be injective where the domain is limited to the codomain? - Information Security Stack Exchange
Cryptographic Hash Functions
cryptography - Is every encryption a bijective function? - Mathematics Stack Exchange
encryption - Why AES is not used for secure hashing, instead of SHA-x? encryption vs hashing - Information Security Stack Exchange
T-function - bijective mapping function - Wikipedia
hashing - What is an example for a one-way hash function? cryptogtaphic (one-way) hash functions vs hash functions - Software Engineering Stack Exchange
How are cryptographic hash functions developed? encryption design - Quora
algorithm design - Perfect hash function - vs injective function vs random oracle - Cryptography Stack Exchange
Hash function - perfect hash function, injective - Wikipedia
Perfect hash function - injective function - dynamic/minimal perfect hash function
Designing a good non-cryptographic hash function · Ticki's blog
CMPH - C Minimal Perfect Hashing Library - perfect hash functions implementations
Infinite monkey theorem - Wikipedia
Shor's algorithm - post-quantum encryption, big integer factorization, RSA obsolescence - Wikipedia
Quantum-Secure Cryptography Crosses Red Line - post-quantum cryptography | Quanta Magazine
Post-Quantum-Cryptography
Post-quantum cryptography
Literal (computer programming) - fixed value in source code
Phases of translation by C Compilers - cppreference.com
Phases of translation by C++ Compilers - cppreference.com
operating system - What is the difference between a stack overflow and buffer overflow? - Stack Overflow
Buffer over-read/overrun - used in Heartbleed attack - Wikipedia
Buffer Overruns and Overflows - integer overflow, format string, prevention - OWASP
Buffer Overflow Attack
HD Evidence Overview - forensics
Computer Forensics - Academic Course
Null-terminated multibyte strings - cppreference.com
strcpy, strcpy_s - cppreference.com
std::strcpy - cppreference.com
strdup - cppreference.com
GitHub - Apress/design-patterns-in-modern-cpp: Source code for 'Design Patterns in Modern C++' by Dmitri Nesteruk - 2018
EncryptedHome - Community Help Wiki
iPhone Encryption and the Return of the Crypto Wars - government/FBI surveillance - overall encryption tools - Schneier on Security
Disk encryption theory - XEX-based tweaked-codebook mode with ciphertext stealing (XTS)
Enable disk encryption after installation - home encryption vs full encryption - Ask Ubuntu
EncryptedPrivateDirectory - Community Help Wiki
LUKS In-Place Conversion Tool - Full Disk Encryption
What Is Web Shell PHP Exploit - Examples & Fixes
malware - How can I detect whether a webshell exploit has been run? - Information Security Stack Exchange
Hacking with Netcat part 2: Bind and reverse shells - Hacking Tutorials
ICMP Reverse Shell - bind vs reverse
Bind Shell vs Reverse Shell – irichmore
SecuriGetting Reverse Shell From Web Shell | RCE | SQL - OS Shell | Command Injection
bind shell vs reverse shell : netsecstudents
The Definitive Guide about Backdoor Attacks - What are WebShell BackDoors
What are web shells – Tutorial – BinaryTides
Web Shells – definitve breakdown - Threat Awareness and Guidance
What is a Web shell?
php.ini security risks - Malware Expert
Technique: Web Shell - MITRE ATT&CK™
Linux Find Out My Machine Name/Hostname - hostname command, hostnamectl, /proc/sys/kernel/hostname - nixCraft
Filesystem in Userspace - FUSE - Previously part of AVFS A Virtual Filesystem - Wikipedia
How does Nautilus store passwords on Ubuntu? password storage - Gnome Keyring - Information Security Stack Exchange
Gnome Keyring Doc - security philosohpy, password secure storage- GNOME Wiki!
GNOME Keyring - Wikipedia
Seahorse (software) - GNOME front-end application for managing PGP and SSH keys - secure password/key storage - Wikipedia
operating systems - Are passwords in memory? secure password storage, memory dump - Information Security Stack Exchange
client side - How to securely store my passwords? secure password storage, password managers, keepass - Information Security Stack Exchange
linux - How can a file manager mount a drive without root? setuid program, PAM, /user/sbin/userhelper - Unix & Linux Stack Exchange
Allow non-admin users to mount drives via nautilus - Ask Ubuntu
authentication - Stop Ubuntu asking for password to mount second drive - Ask Ubuntu
debian - Make Nautilus mount USB so unprivileged user can write to it - authorize drive mount without privileges, /etc/fstab - Super User
partitioning - Why am I asked for my password when I want to mount a drive - nautilus mounting without password - definitive answer - security concerns - Ask Ubuntu
C/C++ Calling Conventions on Linux vs Windows - cdecl, thiscall, clrcall, fastcall, regcall,
c - In which memory segment command line arguments get stored? - Stack Overflow
Executing main() in C/C++ - entry point, _start() l_libc_start_main() functions, ELF's e_entry field behind the scene - objdump, gcc -nostartfiles - definitive breakdown - GeeksforGeeks
Functions that are executed before and after main() in C - GeeksforGeeks
Main function in C++- cppreference.com
Segfaults are our friends and teachers - rust language
Anatomy of a Program in Memory - Linux Process Anatomy, _lib_start_main(), diagram of program start up execution from loader to main- detailed memory segments model : memory mapping segment, kernel space, bss, data, text segments - definitive breakdown | Many But Finite
iPhones, Armed Robbery, and Hacking - What to do when mobile phone gets stolen | Many But Finite
Journey to the Stack, Part I - stack frame - good walkthrough | Many But Finite
How The Kernel Manages Your Memory - virtual memory areas, page tables, memory descriptor, mm_struct, task_struct process descriptor - Page Base Physical Address, brk() - segmentation fault - VMA, PTE | Many But Finite
Getting Physical With Memory - CPU pins, RAM, data cache, cache lines | Many But Finite
CPU Rings, Privilege, and Protection - x86 | Many But Finite
Memory Translation and Segmentation - chipset, physical memory address PMA - Logical Memory Address - boot process - Global Descriptor Table GDT - Local Descriptor Table LDT -RPL Requested Privilege Level | Many But Finite
The Kernel Boot Process | Many But Finite
IP Spoofing - DEFCON - Speaker Deck
SYN packet handling in the wild
Kernel bypass
switch - Why can't devices on different VLANs, but on the same subnet, communicate? VLAN vs Subnetwork - Network Engineering Stack Exchange
payment card user tracking - What information about me do stores get via my credit card? privacy/anonymity - Information Security Stack Exchange
Using your android smartphone as a Wifi repeater without root - tethering : NintendoSwitch
linux - where is PCB stored in memory - Process Control Block - context switch - Stack Overflow
Board support package - BSP - Embedded Systems, hardware-specific drivers - Flash memory - Wikipedia
Comparison of real-time operating systems - Wikipedia
How to Fix Broken Packages in Ubuntu - apt update --fix-missing, apt install -f, dpkg --configure -a - Make Tech Easier
privacy - How trustworthy is Firefox? privacy respectuous browsers - Information Security Stack Exchange
SHA1 vs SHA2 vs SHA256 – What’s the difference?
cryptography - sha-512 vs sha-3? - Information Security Stack Exchange
cryptography - Has SHA-3 Arrived? - Information Security Stack Exchange
cryptography - What's the difference between the hash algorithms SHA-2 and SHA-3? - Stack Overflow
The Difference Between SHA-1, SHA-2 and SHA-256 Hash Algorithms
hash - What is SHA-3 and why did we change it? - Information Security Stack Exchange
cryptography - What did Blackberry do wrong? RIM Blackberry Encryption - Information Security Stack Exchange
encryption - SHA, RSA and the relation between them - Asymmetric/Symmetric Encyption - PKCS#1 v1.5 - Hybrid Encryption - Cryptographic Hash Function -SHA-1, SHA-0, SHA-224, SHA-256, SHA-384, SHA-512, SHA-2 - Building Blocks, Primitives - Digitial Signatures - RSA OAEP Padding - TLS usage of hash functions, HMAC, Key Derivation Functions - - Information Security Stack Exchange
hash - Confidentiality of file hashes - SHA-1 weaknesses - Information Security Stack Exchange
How is flash memory different from RAM or ROM? - Quora
If flash memory is ROM (read only) , how are we writing data onto USB? vs EEPROM - Quora
What is the difference between Flash memory and EEPROM? ROM, OTPROM - Electrical Engineering Stack Exchange
eCos - Embedded Configurable Operating System (eCos) is a free and open-source real-time operating system intended for embedded systems and applications which need only one process with multiple threads -Wikipedia
Local Interconnect Network - LIN - vs CAN bus - Automotive Industry fieldbus - Wikipedia
Automotive electronics – CAN and LIN buses
GitHub - radareorg/awesome-radare2: A curated list of awesome projects, articles and the other materials powered by Radare2 - Tutorials list, cheat sheets - CTF Writeups, Tools
deletion - How to safely wipe a USB flash drive - Secure deletion/erasure - wear levelling memory block - flash memory - Information Security Stack Exchange
secure deletion - Is it enough to only wipe a flash drive once? flash memory - overwritting passes - Information Security Stack Exchange
source code - Writing file shredder - secure deletion/erasure function implementation - PRNG - SSD vs Magnetic drives - Information Security Stack Exchange
Synchronization (computer science) - Thread and process synchronization - Wikipedia
c++ - What is POSIX, any other interface standards which can replace it? - Stack Overflow
ASIC Mining: Review of Bitcoin ASICs, ASIC vs GPU, CPU – BitcoinWiki
Application-specific integrated circuit - Wikipedia
Printed circuit board - Wikipedia
Hardware restriction - Wikipedia
Secure Boot - ArchWiki
UEFI/SecureBoot - Ubuntu Wiki
Secureboot - Fedora Project Wiki
SecureBoot - FreeBSD Wiki
SecureBoot - Debian Wiki
SecureBoot/Testing - Debian Wiki
UEFI/SecureBoot/DKMS - Ubuntu Wiki
Secure Boot · Security-Onion-Solutions/security-onion Wiki · GitHub
embedded.com/print/4008796
Design and debug your ROM-based code | Embedded
operating system - Basic question regarding ROM based executable - Stack Overflow
C file functions in embedded world - Stack Overflow
Understanding embedded-system-boot techniques | EDN
What is the boot-loader and startup code in embedded system? - Quora
RAM/Flash Usage in Embedded C Programs
Malicious Code Execution in PCI Expansion ROM
ARM Information Center
How to Ensure a Bug Free BootROM?
502 Bad Gateway
Protect and control software stored in flash memory
Fuller2_English.pdf
anssi-cible-cspn-2017_22en.pdf
arm-trusted-firmware/firmware-design.rst at master · ARM-software/arm-trusted-firmware · GitHub
Introduction to STM32 microcontrollers security - Application note - en.DM00493651.pdf
Secure-Boot-Image-Authentication_11.22.16.indd - secure-boot-and-image-authentication-technical-overview.pdf
Microsoft Word - DS2704.doc - DS2704.pdf
boot - Who loads the BIOS in RAM during computer bootstrap - ROM, NVRAM, LPC Bus, CPU Real Mode, Flashed memory - Super User
Secure Access Control Through Challenge and Response Authentication - Application Note - Maxim - AN4784.pdf
Universal asynchronous receiver-transmitter - UART - computer hardware device for asynchronous serial communication - serial port
Serial Peripheral Interface - SPI
I²C - I2C - Inter-Integrated Circuit, pronounced I-squared-C, I2C pronounced I-two-C or IIC pronounced I-I-C - synchronous, multi-master, multi-slave, packet switched, single-ended, serial computer bus
UART vs SPI vs I2C | Difference between UART,SPI and I2C
embedded - UART vs I2C vs SPI for inter-processor communication between microcontrollers - Stack Overflow
communication - USART, UART, RS232, USB, SPI, I2C, TTL, etc. what are all of these and how do they relate to each other? - Electrical Engineering Stack Exchange
Comparison_Between_SPI_I2C_UART - comparison_between_SPI_I2C_UART.pdf
Selecting Between I2C and SPI for Your Project
What are the pros and cons of an I²C versus an SPI interface? - Quora
UART vs. SPI vs. I2C | The Swarm Robotics Team
UART vs SPI vs I2C
Common Communication Peripherals on the Arduino: UART, I2C, and SPI | Arduino | Maker Pro
Communication Protocols (UART, SPI,I2C)
DSM CC - Wikipedia
Security Explorations - Digital satellite TV platform - PoC
IPTV Security: Protecting High-Value Digital Contents - David H. Ramirez - Google Books
An Introduction to DSM-CC
How To Become An Expert In DSM-CC – TV Without Borders
linux - What is the meaning of "POSIX"? - Stack Overflow
POSIX - Portable Operating System Interface
c - What the role of libc(glibc) in our linux app? - Stack Overflow
What is the significance of libc and POSIX-compliance in a UNIX system? - Quora
C POSIX library - Wikipedia
const volatile, register volatile, static volatile in C++ - Stack Overflow
Understanding "volatile" qualifier in C | Set 2 (Examples) - GeeksforGeeks
Cache and Registers | HowStuffWorks
Introduction to the volatile keyword | Embedded
Poke-a-hole and friends - memory alignment [LWN.net]
UNIX System V - Wikipedia
Unix philosophy - DOTADIW, or "Do One Thing and Do It Well." - Worse is better - Signals, System calls, interruptions - Wikipedia
c++ - Is segmentation fault actual undefined behavior when we refer to a non-static data-member - Undefined Behavior, ASLR, Valgrind, -fsanitize gcc, Instrumentation, Halting Problem - Stack Overflow
Pointer aliasing - multithreading - Wikipedia
c - Assignment operator sequencing in C11 expressions vs C++ - i=i++ Undefined Behavior - side effect
Why is C/C++ main argv declared as "char* argv[]" rather than just "char* argv"? entry point, main calling by crt0 - Software Engineering Stack Exchange
crt0 - c0 - C runtime 0 - _start, entry point - Wikipedia
Why is it bad to log in as root? account, password- Ask Ubuntu
What are SHA-rounds? iterations count - Information Security Stack Exchange
School performs periodic password audits. Is my password compromised? - Information Security Stack Exchange
Why do phishing e-mails use faked e-mail addresses instead of the real one? Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), and Domain-based Message Authentication, Reporting and Conformance (DMARC). - Information Security Stack Exchange
Dark web hacker selling admin access to a Chinese railway company - Sixgill, an Israel based cyber threat intelligence company that analyzes Deep and Dark web
States Need Way More Money to Fix Crumbling Voting Machines | WIRED
Clever Tool Uses Apple’s Videogame Logic Engine to Protect Macs | mac os x security - WIRED
PlayStation serial number leads Feds to bust a massive drug ring - anonymity
The NSA Makes Ghidra, a Powerful Cybersecurity Tool, Open Source | WIRED
Steps to be followed when granting WordPress admin access to someone
NSA Releases GHIDRA 9.0 — Free, Powerful Reverse Engineering Tool
Cia leaks Vault7 - wikileaks - Home
Download NSA's reverse engineering tool GHIDRA
GitHub - NationalSecurityAgency/ghidra: Ghidra is a software reverse engineering (SRE) framework
Saudi caller ID app Dalil leaked data of over 5 Million users
More than Half of Android apps ask for dangerous permissions. Is yours among? free vpn services risks
Hackers steal 6TB of data from enterprise software developer Citrix
Writing better embedded Software - Dan Saks - Keynote Meeting Embedded 2018 : Standard C++
Citrix Data Breach – Iranian Hackers Stole 6TB of Sensitive Data
It's Surprisingly Simple to Hack a Satellite - Motherboard
Disguised as Citrix Utility, Kedi RAT Exploits Gmail to Transfer Data
New Google Chrome Zero-Day Vulnerability Found Actively Exploited in the Wild
Why we can't implement AES 512 key size? - Cryptography Stack Exchange
What is the main difference between a key, an IV and a nonce? - Cryptography Stack Exchange
In Diffie-Hellman, are $g$ and $p$ universal constants or are they chosen by one party according to a set of rules? - Cryptography Stack Exchange
Obfuscating functions that are mostly zero - obfuscation - Cryptography Stack Exchange
Can I Use Tails in One Stick of USB? ( 8Gb) instead of 2 (4Gb) Stick - Tor Stack Exchange
Playing All Videos on Tor Safely - Tor Stack Exchange
How Tor handles cookies? - Tor Stack Exchange
Can onion directories find my address? - Tor Stack Exchange
How to map the deep web? - Tor Stack Exchange
News, Tips, and Advice for Technology Professionals - TechRepublic
Why you should avoid running applications as root | Benjamin Cane
Are the iPhone "connect the dots" passwords secure? pattern lock - Information Security Stack Exchange
Track & find your stolen phones, laptops & tablets | mobile phone supervision and security - Prey Anti theft
How to run service not as root - Super User
What is an orphaned inode? - Unix & Linux Stack Exchange
Why Ida pseudo-code translate test as AND? test vs and, cmp vs sub - Reverse Engineering Stack Exchange
BEWARE – New 'Creative' Phishing Attack You Really Should Pay Attention To
Verifications.io breach: Database with 2 billion records leaked
Vulnerable smart alarms allowed hackers to track & turn off car engine
Turn On Auto-Updates Everywhere You Can | WIRED
New backdoor malware hits Slack and Github platforms
Virtual filesystems: Why we need them and how they work | Opensource.com
The Pirate Bay spreading malware PirateMatryoshka via reputed seeders
Machine Learning Can Use Tweets to Automatically Spot Critical Security Flaws | WIRED
Linux System Hardening (W45) - BIOS Security GRUB- Hardening NFS Security- SSH and remote access- FTP and HTTP configuration security- Determining firewall configuration- Hakin9 - IT Security Magazine
GitHub - ismailtasdelen/reverse-shell-cheatsheet: 🙃 Reverse Shell Cheat Sheet 🙃
android_reverse_engineering_use_case_bypass_ssl
Phishing and Social Engineering Techniques
Caller ID Spoofing solutions - Security Through Education
Caller ID - caller identification, CID), also called calling line identification (CLID), Calling Line Identification (CLI), calling number delivery (CND), calling number identification (CNID), calling line identification presentation (CLIP), or call display - Wikipedia
How can someone spoof texts with my phone number? - ss7 - Information Security Stack Exchange
Is it possible to un-spoof a spoofed caller ID? - Information Security Stack Exchange
TextMagic - online sms text sending message - Wikipedia
How Does Caller Spoofing Technology Work?
Spoofed? Here’s What It Means & What You Can Do - caller id spoofing mitigation - SpoofCard
Robocalls from spoofed Caller IDs may soon be blocked by phone companies | Ars Technica
(PDF) You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks
How to Build Your Own Caller ID Spoofer: Part 1
Open Source Communications Software | caller id - Asterisk Official Site
robocalls-part5-caller-id-spoofing.pdf
Best way to spoof caller ID on PSTN calls? - skype4b
Send Free Anonymous SMS Text Messages Via the Web
How easy it is to spoof phone numbers - Business Insider
Public switched telephone network - pstn - Wikipedia
Threat Model for Secure Password Storage and retrieval
Powtoon | Create Awesome Videos Yourself
RESTful API Security - DZone Integration
RFC 6749 - The OAuth 2.0 Authorization Framework
API Keys ≠ Security: Why API Keys Are Not Enough | Nordic APIs |
Amber Authenticate Protects Video Footage From Deepfakes and Tampering | video authentication - defense against deepfake -WIRED
Quick questions about MQTT of a beginner - Internet of Things Stack Exchange
How to protect Raspberry Pi from attack in an IoT setup connected through a Broadband network? - Internet of Things Stack Exchange
Can Tor be used with applications other than Web browsers? - Tor Stack Exchange
Me -> Tor -> Vpn [How?] - Tor Stack Exchange
Why can't I open most of the onion sites? - Tor Stack Exchange
Why Do Some Websites Block VPNs?
Shlayer Malware Disables macOS Gatekeeper to Run Unsigned Payloads
Up (Ultimate Plumber) - Tool For Writing Linux Pipes With Instant Live Preview - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Researchers Implant "Protected" Malware On Intel SGX Enclaves
What Happens If Russia Cuts Itself Off From the Internet | WIRED
Russian to shut down Internet to test its cyber deterrence
An info stealer .exe malware is targeting Mac users around the globe
Structure aware fuzzing - Réka Kovács - Meeting C++ 2018 : Standard C++
Xiaomi Electric Scooters Vulnerable to Life-Threatening Remote Hacks
New Unpatched macOS Flaw Lets Apps Spy On Your Safari Browsing History
RunC Flaw Lets Attackers Escape Linux Containers to Gain Root on Hosts
Critical zero-day vulnerabilities hit Lifesize video conferencing products
Modem vs Router: What is the Difference between Modem and Router?
WARNING – New Phishing Attack That Even Most Vigilant Users Could Fall For
Why should you use Rust in WebAssembly? | Opensource.com
Dark Web hacker selling 126M accounts stolen from new data breaches
Lazygit - Simple Terminal UI For Git Commands - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Ex-US Intelligence Agent Charged With Spying and Helping Iranian Hackers
Why the US Needs a Strategy for AI | WIRED
PF_RING - High-Speed Packet Capture, Filtering And Analysis - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Programming languages to learn now, network monitoring tools, backup solutions, and more must-reads | Opensource.com
What's the right amount of swap space for a modern Linux system? | Opensource.com
Cybersecurity Workers Scramble to Fix a Post-Shutdown Mess | WIRED
Securing small home automation setup - Internet of Things Stack Exchange
password_strength - entropy - xkcd
https://www.cs.bu.edu/~reyzin/papers/entropy-survey.pdf
What-is-entropy-in-terms-of-cryptography
entropy in cryptography at DuckDuckGo
Entropy in Cryptography - YouTube
Entropic security - Wikipedia
https://ws680.nist.gov/publication/get_pdf.cfm?pub_id=915121
Encryption is less secure than we thought | MIT News
What-is-Lattice-cryptography
Entropy (information theory) - Wikipedia
entropy information theory at DuckDuckGo
Topic - Quora
Question - Quora
How can BitTorrent traffic be anonymized with Tor? - Tor Stack Exchange
Bittorrent over Tor isn't a good idea | Tor Blog
Compromising Tor Anonymity Exploiting P2P Information Leakage - pdf
doc/TorifyHOWTO – torify software - Tor Bug Tracker & Wiki
DDoS Prevention: Protecting The Origin
What is the difference between a DDoS attack and a PDoS attack? - Internet of Things Stack Exchange
How To Configure SSH Key-Based Authentication on a Linux Server | DigitalOcean
SELinux - Debian Wiki
What should be done to secure Raspberry Pi? - Raspberry Pi Stack Exchange
Securing Debian - linux security hardening - Manual
What Is the Difference Between DSL and ADSL? | Reference.com
Subdomain Takeover: Basics
Kerberoast Attack - cheatsheet
TrevorC2 - Command and Control
How to set a breakpoint in an execve'd program in radare2? - Reverse Engineering Stack Exchange
how can I diff two x86 binaries at assembly code level? - Reverse Engineering Stack Exchange
How does ptrace work in Linux? - Stack Overflow
Capture the Flag Challenges - 200 guided resolutions writeups
infographics - major modern car security risks
6 places to host your git repository - set up own git repo | Opensource.com
Handbook of Applied Cryptography - resources - book
What's a cryptographic primitive, really? - Cryptography Stack Exchange
Comparing ECDSA vs RSA - SSL.com
Cryptographic primitive - vs protocol
HMAC-SHA1 vs HMAC-SHA256 - Cryptography Stack Exchange
How can I generate large prime numbers for RSA? - Cryptography Stack Exchange
This Person Does Not Exist - GAN Generative Adversarial Network - deep fake
How deep learning fakes videos (Deepfakes) and how to detect it?
deep fake with gan generative adversial network -
Gartner Debunks Five Artificial Intelligence Misconceptions
You can now install full Windows 10 ARM on your Raspberry Pi 3
Why Freelancing Creates Anxiety About Money
How to channel all traffic on Kali linux through Tor? - Tor Stack Exchange
How can BitTorrent traffic be anonymized with Tor? - Tor Stack Exchange
Changes to the OWASP Top 10 Project List | Toptal
Password Cracking - Hakin9 - IT Security Magazine
Building a Hacking Kit with Raspberry Pi and Kali Linux - Hakin9 - IT Security Magazine
the mathematics of public key cryptography - pdf
concurrency multithteading data race attaks
Race Condition Vulnerability Lab - access system call, suid
Preventing Race Condition Attacks on File-Systems
Race condition - security, dos denial of service, privilege escalation, TOCTTOU - Wikipedia
Time of check to time of use - TOCTTOU - access system call, setuid - Wikipedia
Exploiting and Protecting Against Race Conditions | Lightning Security
Moving Beyond The OWASP Top 10, Part 1: Race Conditions
Exploiting Concurrency Vulnerabilities in System Call Wrappers - pdf
Portably Solving File TOCTTOU Races with Hardness Amplification - pdf
x Setuid demystified - definitive course - ruid, euid, suid, fsuid - uid-setting system calls comparison setresuid() vs seteuid() vs setreuid() vs setuid() vs setfsuid() vs setgid() and relatives - setuid-capability - api improvement suggestions for dropping/restoring privileges, verify the process cannot restore privilege - pdf
Checking for Race Conditions in File Accesses - pdf
Exploiting Unix File-System Races via Algorithmic Complexity Attacks - tocttou vulnerability - pdf
Understanding and Detecting Concurrency Attacks - pdf
Concurrent Security of Cryptographic Protocols - zero knowledge proof
Concurrency: A problem and opportunity in the exploitation of memory corruptions - pdf
Do any security experts recommend bcrypt for password storage? vs PBKDF2 - Information Security Stack Exchange
Exploring Swift Memory Layout - types of memory
Say this five times fast: strace, ptrace, dtrace, dtruss - DEV Community 👩‍💻👨‍💻
Fake Google reCAPTCHA used to hide Android banking malware | ZDNet
Password Hashing Competition
Severe vulnerabilities uncovered in popular password managers | ZDNet
PBKDF2 - Password-Based Key Derivation Function 2 -Wikipedia
MatasaEnough With The Rainbow Tables: What You Need To Know About Secure Password Schemes - adaptive hashing - bcrypt
cpu architecture security - cissp covering course
simultaneous multi-threading | securityinaction
Hyper-threading - Wikipedia
Is Hyper-Threading a Fundamental Security Risk? meltdown, spectre - ExtremeTech
Should You Disable Hyper-Threading? security – Bitsum
CONCURRENCY VULNERABILITIES - pdf
How can TOCTTOU vulnerabilities within the Windows OS be mitigated? - Information Security Stack Exchange
How does Server-side Handle the same multiple requests at the same time? concurrency security - Information Security Stack Exchange
Security considerations in concurrent applications - deadlocks - Information Security Stack Exchange
Deadlock - Wikipedia
Mutual exclusion - mutex - Wikipedia
Concurrency control - acid databases - Wikipedia
Troy Hunt: Passwords Evolved: Authentication Guidance for the Modern Era - patterns, passwords managers
Strength Test
A seccomp overview [LWN.net]
Security/Sandbox/Seccomp - MozillaWiki
Restricting Application Capabilities Using Seccomp | Cluster Administration | OpenShift Container Platform 3.3
Linux Seccomp Learning | w0lfzhang's blog
Blizzard CTF 2017 Strng | vm sandbox escape - w0lfzhang's blog
ctfs, hacking challenges, security writeups - Archive | w0lfzhang's blog
seccomp secure computing kernel sandbox
Argon2: the memory-hard function for password hashing and other applications - specifications - 2015
Bindings for other languages - password hashing - Libsodium documentation
How to Safely Store a Password in 2016 - argon bcrypt scrypt pbkdf2
How to Safely Implement Cryptography Features in Any Application - what makes libsodium so great - libsodium
In 2018, what is the recommended hash to store passwords: bcrypt, scrypt, Argon2? - Information Security Stack Exchange
Are there more modern password hashing methods than bcrypt and scrypt? - Information Security Stack Exchange
Why do people think that this is bad way to hash passwords? roll out own cryptographic scheme issues- md5 -Information Security Stack Exchange
How does password salt help against a rainbow table attack? - Stack Overflow
Kerckhoffs's principle - Shanon's Maxim - vs security through obscurity - Wikipedia
How To Safely Store A Password - 2011 | codahale.com
I'd recommend you to use Argon2 instead of bcrypt for storing password. It has w... | Hacker News
Does libsodium sealed box leak key ids? - Cryptography Stack Exchange
How safe are Libsodium Crypto Boxes? - Cryptography Stack Exchange
Cryptographic Best Practices · GitHub
scrypt - Wikipedia
Key derivation function - kdf - password hashing - Wikipedia
What's the advantage of using PBKDF2 vs SHA256 to generate an AES encryption key from a passphrase? - Information Security Stack Exchange
Is Bcrypt the best possible password hashing algorithm? - node
Argon2 - Wikipedia
Group (mathematics) - Wikipedia
Field (mathematics) - corps - Wikipedia
What's the advantage of scrypt over bcrypt? - Stack Overflow
Everything You Wanted to Know About Hashing and Encrypting Passwords - definitive breakdown - hmac vs kdf vs scrypt vs bcrypt vs pbkdf vs pbkdf2 implementations
Hash It Right: Implementing PBKDF2 in .NET - Lock Me Down
Welcome to pyca/cryptography —python Cryptography 2.6.dev1 documentation
Key stretching - often used by key derivation functions KDF, bcrypt, pbkdf, FDE Full Disk Encryption - hash based, strength anf time
Key derivation functions (KDF): What are? Main purposes? How can they be used? - Cryptography Stack Exchange
What is the difference between Key Derivation Function and (salted) Hash? - Information Security Stack Exchange
Password Hashing: PBKDF2, Scrypt, Bcrypt and ARGON2
Password hashing security of argon2 versus bcrypt/PBKDF2? - Cryptography Stack Exchange
Starting fuzz with AFL - american fuzzy lop - | w0lfzhang's blog
ASUS router stack overflow in http server | w0lfzhang's blog
arm instructions learning | w0lfzhang's blog
arm_exploit/README.md at master · w0lfzhang/arm_exploit · GitHub
What security measure one should implement before executing user uploaded files? - Information Security Stack Exchange
New Intel CPU Flaw Exploits Hyper-Threading to Steal Encrypted Data
Meet the latest vulnerability in your multi-threaded CPU: PortSmash - TechSpot
Will 'Deepfakes' Disrupt the Midterm Election? | WIRED
Facebook's Onavo Protect VPN Offers Less Privacy Protection Than Other Apps | WIRED
ATM Hacking Has Gotten So Easy, the Malware's a Game | WIRED
NATO Group Catfished Soldiers to Prove a Point About Privacy | WIRED
How Can Bitcoin Be Lost Or Stolen When It's In An Immutable Encrypted Distributed Ledger?
LinkedIn Messaging Abused to Target US Companies With Backdoors
5 things to master to be a DevOps engineer - devsecops | Opensource.com
Russian Hackers Go From Foothold to Full-On Breach in 19 Minutes - full compromisal time | WIRED
InfoSec Handlers Diary Blog - How Malware Generates Mutex Names to Evade Detection
Taking Care of Your Personal Online Security (For Paranoids) - anonymity throughout attack - tor1 to vpn to tor2 - definitive - definitive - privacy, anonymity, surveillance - disk encryption, Encryption, Online Security, OpenVPN, security, Tor
How to write more reliable code - Egor Bredikhin - Meeting C++ 2018 : Standard C++
Understanding VPN through open systems interconnection model - OSI - definitive - privacy, anonymity, surveillance
Eraser - Secure Erase Files from Hard Drives on Windows - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
The First Ransomware to Exploit Telegram Cracked and Decryptor Published
13 Ways Cyber Criminals Spread Malware
Air-conditioned apocalypse: A blackout scenario involving smart climate control devices
Most Threatening DNS Security Risks And How To Avoid Them - cache poisoning
Compile time regular expressions - Hana Dusíková - Meeting C++ 2018 : Standard C++
Hacking Virtual Reality – Researchers Exploit Popular Bigscreen VR App
Warning: Critical WinRAR Flaw Affects All Versions Released In Last 19 Years
How to detect a virtualized environment? - Reverse Engineering Stack Exchange
Transcendental equation - Wikipedia
Arm unveils security certification testing for IoT devices - platform security architecture, psa certified | VentureBeat
Buying a "Used" Router - firmware tampering - Information Security Stack Exchange
Is it possible to detect 100% of SQLi with a simple regex? - sql injection mitigation - Information Security Stack Exchange
Should corporate security training be tailored based on a users' job role? security awareness in corporates - Information Security Stack Exchange
Update now: Latest Nvidia driver fixes dangerous security vulnerabilities - TechSpot
PenTest: soc Inside The Security Operations Center - Pentestmag
DNS Cache Poisoning - dnssec - by Christopher Makarem - Hakin9 - IT Security Magazine
I Used Phishing To Get My Colleagues’ Passwords. This Is What I Did by Sebastian Conijn - Hakin9 - IT Security Magazine
Preventing Mimikatz Attacks by Panagiotis Gkatziroulis - Hakin9 - IT Security Magazine
Email Impersonation Scams by Gabor Szathmari - Hakin9 - IT Security Magazine
Five Python Tricks You Need to Know Today by CE Kan - Hakin9 - IT Security Magazine
Crack WPA/WPA2 Wi-Fi Routers with Aircrack-ng and Hashcat by Brannon Dorsey - Hakin9 - IT Security Magazine
Bien utiliser Git merge et rebase • Delicious Insights
80-bit collision resistence because of 80-bit x87 registers? - Cryptography Stack Exchange
In end-to-end encryption, doesn't the server need to be trusted? WhatsApp, Signal Protocol - Mathematical explanation asymmetric public key encryption - trust on first use TOFU - Verify security code in WhatsApp - Cryptography Stack Exchange
Should I use ECB or CBC encryption mode for my block cipher? - Cryptography Stack Exchange
Why is padding used for RSA encryption given that it is not a block cipher? textbook rsa without padding - Cryptography Stack Exchange
smallstep - Step v0.8.6: valid HTTPS certificates for dev & pre-prod (and more)
Is there always a user notification when smartphones record audio? - Information Security Stack Exchange
Why is Math.random() not designed to be cryptographically secure? - Information Security Stack Exchange
How is an ATM secure? - Information Security Stack Exchange
What is the difference between antivirus and firewalls - Information Security Stack Exchange
What happens if an attacker steals my phone's IMEI number? - Information Security Stack Exchange
code Instrumentation (computer programming) - Wikipedia
Google is using RC4, but isn't RC4 considered unsafe? - Cryptography Stack Exchange
TCP SYN (Stealth) Scan (-sS) | definitive explanation
Difference between Nmap TCP SYN Scan and TCP Connect Scan - Definitive
Multiple Temporary and Disposable Phone Numbers | privacy respecting - onoff app
The Linux Foundation Launches ELISA Project Enabling Linux In Safety-Critical Systems - Linux security - The Linux Foundation
Spectre is here to stay - An analysis of side-channels and speculative execution - google research
How to Get and Set Up a Free Windows VM for Malware Analysis - hacking lab
PrivacyWeb VPN review | TechRadar
Zero Downtime: Jenkins Continuous Deployment with Terraform on AWS | Toptal
The Overlooked Security Threat of Sign-In Kiosks | WIRED
Hackers Can Slip Invisible Malware into 'Bare Metal' Cloud Computers | WIRED
metasploit-cheat-sheet/README.md at master · ismailtasdelen/metasploit-cheat-sheet · GitHub
Hackers Actively Exploiting Latest Drupal RCE Flaw Published Last Week
tool to reverse and learn kernel heap memory management - salt/README.md at master · PaoloMonti42/salt · GitHub
Reducing security risks with centralized logging | Opensource.com
Check your VPN DNS test tool legitimacy: Is it "good" or deceptive - definitive - privacy, anonymity, surveillance
Cracking passwords using Nvidia's latest GTX 1080 GPU (it's fast) - TechSpot
Drupal core - Highly critical - Remote Code Execution vulnerability - SA-CORE-2019-003 | Drupal.org
Password Managers: Under the Hood of Secrets Management - vulnerabilities - Independent Security Evaluators
Extracting a 19 Year Old Code Execution from WinRAR - path traversal -Check Point Research
What tools and techniques do we have at disposal to manually search for rootkits? - Information Security Stack Exchange
What technical reasons are there to have low maximum password lengths? - Information Security Stack Exchange
How do services with high uptime apply patches without rebooting? hotpatching - Information Security Stack Exchange
Which password policy is more secure: one password of length 9 vs. two passwords each of length 8? - Information Security Stack Exchange
Angr : A Powerful & User-Friendly Binary Analysis Platform - tool
Why is fingerprint lock considered less secure than pattern lock on Nexus 5X? - Android Enthusiasts Stack Exchange
Android Forensics: Cracking the Pattern Lock Protection
PIN code is a much safer way for you to lock your Android device
Don't Rely On an Unlock Pattern To Secure Your Android Phone | WIRED
Your Android device's Pattern Lock can be cracked within five attempts
Is a Pattern Lock any more secure then a typical text password? - Information Security Stack Exchange
Is Android's Password Screen Lock Enough Data Theft Protection? - Information Security Stack Exchange
How secure are iPhone/Android/Windows 8 "PIN"/Pattern Lock features? - Information Security Stack Exchange
Understanding /etc/passwd File Format - /etc/shadow - nixCraft
passwd - shadow password file /etc/shadow format - /etc/master.passwd - pluggable authentication modules - crypt(3) - exclamation mark/star for password locked account - Wikipedia
X Window authorization - xauthority - iceauthority - mit-magic-cookie - Wikipedia
PayloadsAllTheThings/Active Directory Attack.md at master · swisskyrepo/PayloadsAllTheThings · GitHub
RDP Clients Exposed to Reverse RDP Attacks by Major Protocol Issues
https://www.google.com/url?q=https://www.staff.uni-mainz.de/pommeren/Cryptology/Bitblock/6_AES/AESstruct.pdf&sa=U&ved=2ahUKEwjHuNuIm6XgAhXi6eAKHXyPCbgQFjAAegQIBxAB&usg=AOvVaw1ZiMf89KPOf401RPN8OuUB
Police forcing me to install Jingwang spyware app, how to minimize impact? - Information Security Stack Exchange
Understanding DNS Queries and Lookups
What is DNS over TLS? Everything you need to know
An extra layer of privacy: setting up a private, in-tunnel DNS-over-TLS proxy for your OpenVPN clients
Google Adds DNS-over-TLS Support to Its Public DNS Service
I found that the company I work for is putting a backdoor into mobile phones - Information Security Stack Exchange
Can I prevent my neighbors, whom I pay for shared internet (wifi), from seeing the sites I've visited? - Information Security Stack Exchange
What is best for privacy, VPN or DNS-over-TLS? sni - VPN
DNS over TLS or HTTPS – the rest of the story | DNSthingy
Which-is-better-for-online-streaming-VPN-or-SmartDNS
ExileRat Targeting Tibetan Supporters via Malicious PowerPoint Docs
The Mirai botnet explained: How IoT devices almost brought down the internet | CSO Online
Security researchers discover new Linux backdoor named SpeakUp | ZDNet
Are there any crackme sites made for cheat engine or to practice game hacking particularly? - Reverse Engineering Stack Exchange
What is the most efficient way to detect and to break xor encryption? - Reverse Engineering Stack Exchange
Analyzing highly obfuscated JavaScript - Reverse Engineering Stack Exchange
How do I figure out what is burned on an Arduino ROM? - Reverse Engineering Stack Exchange
Doesn't the choice of encryption algorithm add entropy by itself? - Information Security Stack Exchange
What is future of SMS 2-step authentication? - Information Security Stack Exchange
XKCD #936: Short complex password, or long dictionary passphrase? - Information Security Stack Exchange
How to use Cloudflare DNS (1.1.1.1) for better privacy | Comparitech
What is the difference between DNS over TLS & DNS over HTTPS?
DNS over TLS - Wikipedia
What's the difference between SSL, TLS, and HTTPS? - Information Security Stack Exchange
Ransomware Attacks and Investigations - eForensics
Question - Quora
ICS and SCADA | Tempered Networks
OnionBrowser for iOS -- how secure is it? - Tor Stack Exchange
Ciphertext indistinguishability - plausible deniability - deniable encryption - data erasure/deletion - non malleability
SANS Digital Forensics and Incident Response Blog | Tools for Examining XOR Obfuscation for Malware Analysis | SANS Institute
GitHub - hellman/xortool: A tool to analyze multi-byte xor cipher
Vigenère cipher - Wikipedia
Where to use union, class and struct? - serialization Stack Overflow
Difference between a Structure and a Union - Stack Overflow
What's the major difference between "union" and "struct" in C.? - Stack Overflow
Difference between Structure and Union in C - GeeksforGeeks
Passive data structure - plain old data - pds - pod - Wikipedia
C++ classes - Wikipedia
Google Created Faster Storage Encryption for All Low-End Devices - adiantum, chacha vs aes
Google's Making It Easier to Encrypt Even Cheap Android Phones | WIRED, chacha, adiantum
Flaws in RDP protocols leaving machines prone to remote code execution
There's No Good Reason to Trust Blockchain Technology | WIRED
Critical Zcash Bug Could Have Allowed 'Infinite Counterfeit' Cryptocurrency
Upcoming Firefox version to offer fingerprinting & cryptomining protection
A New Google Chrome Extension Will Detect Your Unsafe Passwords | WIRED
Flaws in Popular RDP Clients Allow Malicious Servers to Reverse Hack PCs
Severe RCE Flaw Disclosed in Popular LibreOffice and OpenOffice Software
Fnord - Pattern Extractor For Obfuscated Code - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Free download: A guide to organizing your media files with Kodi | Opensource.com
First Hacker Convicted of 'SIM Swapping' Attack Gets 10 Years in Prison
The ChaCha family of stream ciphers
Google Online Security Blog: Introducing Adiantum: Encryption for the Next Billion Users
Adiantum – opensource.google.com
hbsh - adiantum - Cryptology ePrint Archive: Report 2018/720 - {Adiantum}: length-preserving encryption for entry-level processors
New TLS encryption-busting attack also impacts the newer TLS 1.3 | ZDNet
List of the most common passwords - Wikipedia
Password cracking - Wikipedia
Push notifications are the future of multi-factor authentication
Hacking your neighbour's Wi-Fi
Wi-Fi deauthentication attack - Wikipedia
Tracking people via WiFi (even when not connected) | Steve's Blog
How Google works with the global security research community.
XDG Base Directory Specification
X window system SECURITY
What is the role of the .ICEauthority file? - inter-client exchange protocol - Ask Ubuntu
what is .ICEAuthority file in opensuse 11.2 - inter-client exchange protocol - Server Fault
http://www.xfree86.org/current/ice.pdf. inter-client exchange protocol
What is XDG_RUNTIME_DIR? - Ask Ubuntu
X Window System protocols and architecture - ice inter-client exchange protocol and others - Wikipedia
Securing Applications on Linux with PAM | Linux Journal
Pluggable Authentication Modules for Linux | Linux Journal
Linux Authentication Systems - Linux Geek Net
1. Linux Authentication - Linux Server Hacks, Volume Two [Book]
Understanding the Differences Between Agile & DevSecOps - from a Business Perspective - Tech at GSA
From Agile to DevSecOps - The New Stack
DevSecOps: Incorporate Security into DevOps to Reduce Software Risk | AgileConnection
The DevSecOps Manifesto – Continuous Agile – Medium
What is DevSecOps? Developing more secure applications | CSO Online
DevSecOps: Injecting Security into CD Pipelines | Atlassian
Overview — devsecops
Is threat modeling compatible with Agile and DevSecOps? | Synopsys
List of file signatures - magic numbers - Wikipedia
glibc/elf.h at master · magic number - lattera/glibc · GitHub
File Magic Numbers · GitHub
Dr. Fu's Security Blog: Malware Analysis Tutorial 8: PE Header and Export Table
Peering Inside the PE: A Tour of the Win32 Portable Executable File Format
What is ELF Magic? - Unix & Linux Stack Exchange
Magic Bytes – Identifying Common File Formats at a Glance
Magic number (programming) - Wikipedia
Defensics Fuzz Testing: Find Hidden Vulnerabilities | Synopsys
How can DLL injection be detected? - Reverse Engineering Stack Exchange
Approach to extract useful information from binary file - Reverse Engineering Stack Exchange
MISRA C - Wikipedia
What is the purpose of using random IP addresses in SYN Flood Attack? - Information Security Stack Exchange
New TLS encryption-busting attack also impacts the newer TLS 1.3, is ECDHE_RSA also affected? - Information Security Stack Exchange
Is there a loss of entropy by hashing an N-bit random key to produce an N-bit hash? - Information Security Stack Exchange
How to protect websites against ZIP bombs and reference bombs? - Information Security Stack Exchange
How to check that the user entered the correct password when decrypting a file? authenticated encryption, integrity - Information Security Stack Exchange
How to find out what programming language a website is built in? - Information Security Stack Exchange
How is it possible that people observing an HTTPS connection being established wouldn't know how to decrypt it? - Information Security Stack Exchange
Sniffing, Snooping, Spoofing - Information Security Stack Exchange
Why can we still crack snapchat photos in 12 lines of Ruby? -pre-shared" key to encrypt this data (badly using also AES in ECB mode) - Information Security Stack Exchange
Can an employer see what I'm doing on my iPhone whilst logged onto wifi - WhatsApp and iMessages encryption- Information Security Stack Exchange
In Unix, what is PAM? Pluggable Authentication Modules
pamtester - test pluggable authentication modules (PAM) facility
OpenPAM and Linux PAM compatibility - Stack Overflow
Understanding and configuring PAM Pluggable Authentication Modules
How to Configure and Use PAM in Linux Pluggable Authentication Modules
PAM (Pluggable Authentication Modules)
Chapter 4.  Security issues of Linux-PAM - Pluggable Authentication Modules
An Easy Guide to Linux-PAM -Pluggable Authentication Modules - DZone Performance
The Linux-PAM System Administrators' Guide: Security issues of Linux-PAM - Pluggable Authentication Modules
Microsoft Security Development Lifecycle
Applying SDL Security Development Lifecycle Tasks to Sprints | Microsoft Docs
The 9 lives of Bleichenbacher's CAT, it puts another scratch again - Cryptography Stack Exchange
11 Best Freelance Software Architects for Hire in Feb 2019 - Toptal®
RFC 5116 - An Interface and Algorithms for Authenticated Encryption
Why do you need message authentication in addition to encryption? - Information Security Stack Exchange
Why should I use Authenticated Encryption instead of just encryption? - definitive answer - Cryptography Stack Exchange
Authenticated encryption (AE) and authenticated encryption with associated data (AEAD) are forms of encryption which simultaneously assure the confidentiality and authenticity of data. These attributes are provided under a single, easy to use programming interface
Block cipher mode of operation - Initialiation Vector IV - ECB vs CBC, CTR - pseudo-randomness - Authenticated encryption
anonymous sms - Free Texting & Calling App | Wireless Cell Phone Plans | TextNow
anonymous sms - txtDrop.com - Completely Free Text Messaging
Spoof Calls & Change Your Caller ID - Hit Voicemail - Voice disguise | SpoofCard
'sudo su -' vs 'sudo -i' vs 'sudo /bin/bash' - when does it matter which is used, or does it matter at all? Definitive answer login/non-login,interactive/non-interactive - Ask Ubuntu
Cryptanalysis for pentesters (W39) - Pentestmag
Rising Threats in CyberSpace - Organizations Must be Prepared
UK bank falls victim to SS7 attacks, allowing cybercriminals to drain accounts and reminding us why SMS two-factor authentication sucks
Thinking About Making Your Own Raspberry Pi Compute Module Carrier Board?
Cyberbit: A military approach to training cyber security teams | ZDNet
Get started with Freeplane, an open source mind mapping application | design tool - brainstorming - Opensource.com
Booting Linux faster | Opensource.com
What If Your VPN Keeps Logs and Why You Should Care - Encryption, IP Address, Privacy, security, VPN - definitive - privacy, anonymity, surveillance
Security Isn't Enough. Silicon Valley Needs 'Abusability' Testing | WIRED
Defaulting to five open principles | Opensource.com
uncle-spufus/README.md at master · singularthought/uncle-spufus · GitHub
How to Recover Lost or Deleted Files?
The Threat That the US Can't Ignore: Itself | WIRED
iCloud Possibly Suffered A Privacy Breach Last Year That Apple Kept a Secret
New Firmware Version of Nintendo Switch Hacked in just 4 Hours
Researchers Release Tool That Finds Vulnerable Robots on the Internet
Beware; hackers are using malicious TeamViewer tool to spread malware
New Mac Malware steals iPhone text messages from iTunes backups
Will quantum computing break security? | Opensource.com
Why Facebook’s Banned ‘Research’ App Was So Invasive | WIRED
Airbus Suffers Data Breach, Some Employees' Data Exposed
pown-recon/README.md at master · pownjs/pown-recon · GitHub
LOLBAS/README.md at master · LOLBAS-Project/LOLBAS · GitHub
Google Takes Its First Steps Toward Killing the URL | WIRED
Linux kernel gets another option to disable Spectre mitigations | ZDNet
Linux user? Check those patches! Public exploit published for systemd security holes… – Naked Security
The SS7 Flaw Has a Fix, If Phone Companies Would Just Do It | WIRED
How To SIM Unlock Samsung Galaxy S4 GT-I9505 For Free | Redmond Pie
What’s wrong with the Raspberry Pi – Own your bits
Before You Buy Unlocked an Unlocked Phone
How to Unlock a Carrier-Locked Phone: Your Guide to Mobile Freedom
SIM card - Subscriber Identity Module or Subscriber Identification Module
Confused about locked vs. unlocked phones? Ask Maggie explains - CNET
Cell Phone Unlocking FAQs | Federal Communications Commission
SIM lock - Wikipedia
International Mobile Equipment Identity - Wikipedia
Service set (802.11 network) - Wikipedia
How to Unlock a Carrier-Locked Phone | The Whiz Cells
What is a locked phone and why do carriers lock them?
How to Unlock Your Cell Phone (So You Can Bring It to a New Carrier)
deepin - Meet The Linux Desktop That's More Beautiful Than Windows 10 And MacOS
Adding CanSignHttpExchanges Extension :: DigiCert, sgx, webpackage
Signed HTTP Exchanges and WebPackage sgx · Issue #121 · ipfs/in-web-browsers · GitHub
Signed HTTP Exchanges - sgx, webpackage
Intent to Ship: Signed HTTP Exchanges (SXG) - Google Groups
Real URLs for AMP Cached Content Using Cloudflare Workers - sgx, webpackage
How to Open a Backdoor in Android Devices - Hakin9 - IT Security Magazine
« L'intelligence artificielle n'existe pas et la voiture autonome n'existera jamais », selon un expert en IA
Programming and Exploitation: Top Hakin9 Tutorials - Hakin9 - IT Security Magazine
Social Media and Instant Message Forensics - eForensics
Accelerated Mobile Pages - Wikipedia
Developer Preview of better AMP URLs in Google Search – AMP
Signed HTTP Exchanges  |  Web  |  Google Developers
Why we use Ruby on Rails to build GitLab | GitLab
The blocking of VPNs in India and China spells trouble for our internet freedom | TechRadar
Security firm identifies hacker behind Collection 1 leak, as Collection 2-5 become public | ZDNet
Escaping Containers to Execute Commands on Play with Docker Servers
Kernel Side-Channel Attack using Speculative Store Bypass - CVE-2018-3639 - ssbd variant 4 spectre meltdown related - Red Hat Customer Portal
Linux Kernel Spectre Protection Changes to Boost App Performance
New Mac Malware Can Steals Crypto from Exchanges, Can it be Prevented? | CCN
C++11 Multithreading Tutorial via Q&A - Thread Management Basics - A CODER'S JOURNEY
WineHQ Wiki
Introduction to ethical hacking: Become the owner of network - Hakin9 - IT Security Magazine
What is the difference between 'env' and 'printenv'? - Unix & Linux Stack Exchange
Use PowerShell for Network Host and Port Discovery Sweeps – Hey, Scripting Guy! Blog
What is the difference between system and environment variables regarding Windows? - Stack Overflow
windows - What is the difference between user variables and system variables? - Stack Overflow
Difference between shell variables which are exported and those which are not in bash - Unix & Linux Stack Exchange
How to scan an entire network using Nmap? - Ask Ubuntu
environment variable accessibility in Linux between users - Information Security Stack Exchange
Why you don't need an RFID blocking wallet | CSO Online
How do hackers find your credit card details? - Panda Security
Think Your EMV Chip Card Can't Be Hacked? | Bankcard Brokers
Tools to automatically modernize code with constexpr - Software Recommendations Stack Exchange
Why You Don’t Need to Worry About RFID Shielding
What Are RFID-Blocking Wallets? (And Which Should You Buy?)
RFID Blocking is NOT the best way to protect you from skimming
Can a steel woven wallet prevent RFID scanning of credit card information? - Information Security Stack Exchange
How can RFID/NFC tags not be cloned when they are passive technology? - Information Security Stack Exchange
Privacy and security risks of Green Card scanning with or without offical RFID protection envelope - Information Security Stack Exchange
What are some cards that are vulnerable to RFID theft? - Information Security Stack Exchange
How do I list all users with root? - Server Fault
GitHub vs. GitLab vs. Bitbucket: Which code repo should you choose? - JAXenter
Is there a way to change the environment variables of another process in Unix? - Stack Overflow
Is it possible to change the Environment of a parent process in python? - Stack Overflow
Is it possible to pass environment variables from child to parent in user space? - Unix & Linux Stack Exchange
change environment of a running process - Unix & Linux Stack Exchange
Users and groups - ArchWiki
UID (User Identifier) and GID (Group Identifier) | Linux
The Linux kernel: Processes
Fork (system call) - Wikipedia
Parent process - Wikipedia
What ways are there to severely and permanently restrict access to superuser privileges in Linux? - Unix & Linux Stack Exchange
Restricting even root access to a folder - Simplicity is a form of art...
Why is the Unix superuser (uid 0) called root?
HoneyBee: Easy Concurrency in Swift | Toptal
Polkit - Policy-Kit - Wikipedia
How does the power button shut the computer down without root permission? - Unix & Linux Stack Exchange
Why does reboot and poweroff require root privileges? - Unix & Linux Stack Exchange
10 Essential AWS Interview Questions and Answers
Writeup – Samsung Galaxy Apps Store RCE via MITM - Adyta
LOLBAS
Why does POSIX require certain shell built-ins to have an external implementation? - Unix & Linux Stack Exchange
Question - Quora
Question - Quora
Do all different Linux distributions have the same command lines? - Unix & Linux Stack Exchange
Do different distros (but same kernel ver) have same hardware support - Unix & Linux Stack Exchange
Linux distribution - Wikipedia
Understanding the differences between various Linux distro's – Complete, Concrete, Concise
elf vs pe - loaders
What is the difference between ELF files and bin files? - Stack Overflow
Find an instruction in an executable file, given its address in a running process? - Stack Overflow
How does kernel get an executable binary file running under linux? loading - Stack Overflow
When a binary file runs, does it copy its entire binary data into memory at once? loading - Could I change that? - Stack Overflow
How can we develop our own linux distribution?
Linux vs. Unix: What's the difference? | Opensource.com
What is the difference between plain binary format (.bin) and Windows Executable (.exe)? - Stack Overflow
Hackers From Iran Are Reportedly Stealing People’s Travel And Mobile Data In The Middle East
The DDoS that wasn’t: a key takeaway for web domain security | ZDNet
Israel can build robots to wipe out cybercrime: ex-'Israeli NSA' chief | The Jerusalem post
Arch Linux: In a world of polish, DIY never felt so good • The Register
Question - Quora
Arch compared to other distributions - ArchWiki
Do all Linux distros use the same kernel? - Ask Ubuntu
Question - Quora
What about arch makes it so different and complicated - linuxquestions
Les abattements du régime micro-entreprise | Le guide du micro-entrepreneur
A layman's explanation for "Everything is a file" — what differs from Windows? - Unix & Linux Stack Exchange
Everything is file or process - Linux - Unix & Linux Stack Exchange
Question - Quora
Researchers find a new malware-friendly hosting site after a spike in attacks – dropmybin TechCrunch
Protonmail XSS — Stored – Chand Singh – Medium
NT LAN Manager - ntlm - Wikipedia
New build-it-yourself Raspberry Pi computer offers all-in-one kit for hardware hackers - TechRepublic
PrivateVPN by Trunkspace review: A pricier VPN with a solid no-logging commitment | PCWorld
Hacker Lexicon jargon | Latest News, Photos & Videos | WIRED
NIST Cybersecurity Framework (CSF) Reference Tool | NIST
Question - Quora
NIST Cybersecurity Framework: A cheat sheet for professionals - TechRepublic
Microsoft Exchange vulnerable to 'PrivExchange' zero-day | ZDNet
Cyber security standards - Wikipedia
NIST Cybersecurity Framework vs. NIST Special Publication 800-53
https://hitrustalliance.net/documents/csf_rmf_related/CSFComparisonWhitpaper.pdf nist csf vs iso 27000
NIST 800-53 vs ISO 27002 vs NIST CSF
NIST Cybersecurity Framework - Wikipedia
https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf
Qu'est-ce que le revenu fiscal de référence ? | service-public.fr
Le versement libératoire | impots.gouv.fr
Auto-Entrepreneur : statut, démarches, charges et impôts
Zoom sur les impôts de l’autoentrepreneur | etreautoentrepreneur
Déclaration d'insaisissabilité de l'entrepreneur individuel | AFE, Agence France Entrepreneur
Qu’est-ce que le versement libératoire ?
Auto-entrepreneurs : savez-vous calculer toutes vos charges ?
Can a file that is executable be read? - Server Fault
Arch Linux - Wikipedia
Why is "Everything is a file" unique to the Unix operating systems? - Super User
Le versement libératoire de l'impôt sur le revenu d'une micro-entreprise | Le guide du micro-entrepreneur
Les seuils d'application du régime micro-BNC | Le guide du micro-entrepreneur
Auto-entrepreneur : impôt sur le revenu ou prélèvement libératoire ? Exemples d'optimisation fiscale pour les BNC. - Corrige ton impôt
legitimate memory pages that are marked as RWX? - Reverse Engineering Stack Exchange
Chosen-plaintext attack - Wikipedia
Semantic security - indistinguishability
Block cipher mode of operation - Wikipedia
Cryptographic protocol - vs primitives - examples as TLS
Deterministic algorithm - Wikipedia
Block cipher - Wikipedia
Cipher security summary - publicly known attacks against block ciphers and stream ciphers -Wikipedia
Comparison of cryptographic hash functions - Wikipedia
Stream cipher - Wikipedia
Hash function security summary - broken hash functions - Wikipedia
Message authentication code - aka tag - Cryptographic hash functions & message authentication codes - List, Comparison, Known attacks - vs HMAC
Cryptographic hash function - five properties - avalanche effect
EU-FOSSA 2 | Joinup
Initialization vector - starting variable - iv - sv Wikipedia
EU to offer nearly $1m in bug bounties for open-source software – Naked Security
Julia Reda – In January, the EU starts running Bug Bounties on Free and Open Source Software - fossa
Log files: Attacks & Defenses (W38) - eForensics
Debian -- Security Information
Remote Code Execution in apt/apt-get - Information Security Stack Exchange
Is BASIC-Auth secure if done over HTTPS? - Information Security Stack Exchange
How dangerous is it to reveal your date of birth, and why? - Information Security Stack Exchange
How is no password more secure than username+password? eduroam - Information Security Stack Exchange
eduroam Security – eduroam
What is eduroam? – eduroam
How to Hack WPA/WPA2 Wi Fi with Kali Linux: 9 Steps - wikiHow
What are the differences between MD5, SHA and RSA? - Information Security Stack Exchange
If my password was able to be printed on a form sent home from my child's school, does it imply insecure password storage policies? - Information Security Stack Exchange
How to detect if files were saved or copied to a USB drive? - Information Security Stack Exchange
Model of computation - Wikipedia
Python vs Bash - In which kind of tasks each one outruns the other performance-wise? - shells are the glue of linux - Stack Overflow
Turing completeness - Wikipedia
ncurses - Wikipedia
File manager - Wikipedia
cfiles - A Fast Terminal File Manager with Vim Keybindings
Theoretical computer science - Wikipedia
Theory of computation - Wikipedia
Turing machine - Wikipedia
Forget Apple vs. the FBI: WhatsApp Just Switched on Encryption for a Billion People | WIRED
Why can't Windows read Linux filesystems? ext4 fat exfat - Unix & Linux Stack Exchange
Millions of PCs Found Running Outdated Versions of Popular Software
Attackers successfully hide Mac malware in ad images
The Pitfalls of Facebook Merging Messenger, Instagram, and WhatsApp Chats | WIRED
C++ moves for people who don’t know or care what rvalues are 🏘️
Nest Cams Hijacked in the Name of PewDiePie and North Korea Pranks | WIRED
Someone Hacked PHP PEAR Site and Replaced the Official Package Manager
Inside Google’s Team Fighting to Keep Your Data Safe From Hackers - WSJ
Encryption efforts in Colorado challenge crime reporters, transparency - Columbia Journalism Review
Leet - 1337 - Wikipedia
WebRTC - Wikipedia
Chinese Hacker Publishes PoC for Remote iOS 12 Jailbreak On iPhone X
Malice - VirusTotal Wanna Be (Now With 100% More Hipster) - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
New malware found using Google Drive as its command-and-control server
DHS Orders U.S. Federal Agencies to Audit DNS Security for Their Domains
Alleged Russian Hacker Pleads Not Guilty After Extradition to United States
Solving the Year 2038 problem in the Linux kernel | Opensource.com
What-are-some-good-resources-for-learning-computational-complexity-theory
10 Powerful But Not Yet Promoted Antivirus for PC, Mac, Android, iPhone
Analysis of algorithms - Wikipedia
introduction to computability theory
Computer Virus detection decidability proof - Information Security Stack Exchange
Security tradeoffs of pathname-based MAC (e.g., TOMOYO, grsecurity, AppArmor, ...) - Information Security Stack Exchange
Rice's theorem - Wikipedia
SELinux - Debian Wiki
Red Hat Enterprise Linux 4
Computer security model - Wikipedia
https://elinux.org/images/3/39/SecureOS_nakamura.pdf
Why I Like AppArmor More Than SELinux - InsanityBit
sudo su "username" vs. su "username" - Super User
su vs sudo -s vs sudo -i vs sudo bash - Unix & Linux Stack Exchange
What's the difference between "sudo -i" and "sudo su -" - Stack Overflow
Trusted computing base - Wikipedia
Understanding the difference between sudo and su
Steganography - distributed
A beginner's guide to understanding sudo on Ubuntu
What are the differences between "su", "sudo -s", "sudo -i", "sudo su"? - Ask Ubuntu
Why is the most powerful user on a Unix/Linux system called “root?” - Super User
What is nobody user and group? - Unix & Linux Stack Exchange
ELF Specification
Linux Standard Base PDA Specification 3.0RC1
Why does mount require root privileges? /etc/shadow - setuid, nosuid, nodev filesystem permissions - Unix & Linux Stack Exchange
Privilege (computing) - Wikipedia
What is the difference between Linux's root privilege system vs Windows' administrator privilege system? - Super User
Privilege escalation - jailbreaking, rooting
nobody (username) - Wikipedia
Principle of least privilege - PoLP - principle of minimal privilege or the principle of least authority - shatter attacks, rootkits, malware
Linux Shadow File – Explained
How do I change the default text editor in the Debian (squeeze) distro - Unix & Linux Stack Exchange
User ID (UID) Definition
Linux Tips: Password usage in sudo (PASSWD / NOPASSWD) - MDLog:/sysadmin
what is difference between /etc/shadow and /etc/passwd - Ask Ubuntu
Understanding /etc/passwd file - Kernel Talks
Question - Quora
IBM Knowledge Center - Using the /etc/passwd file
The /etc/passwd file, by The Linux Information Project (LINFO)
Difference between passwd and passwd- file - Unix & Linux Stack Exchange
Directory traversal attack - misuse of /etc/passwd file in Unix - Wikipedia
XOR gate - Wikipedia
XOR cipher - Wikipedia
Comparison Between AppArmor and Selinux - Information Security Stack Exchange
Linux Security Modules - Wikipedia
WhatIs - tomoyo comparison selinux - PukiWiki
TOMOYO Linux - ArchWiki
Linux Kernel Security (SELinux vs AppArmor vs Grsecurity) - nixCraft
Sh00T - A Testing Environment and task manager for Manual Security Testers - evernote-like - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Keeping secrets from root on Linux - Information Security Stack Exchange
Unmarshalling - Wikipedia
Common Gateway Interface - cgi - Wikipedia
Marshalling (computer science) - Wikipedia
Does root overrides read only permisssion(even to root) set to directory in unix? - Stack Overflow
Endian Conversion Functions - develop
https://cs.brown.edu/cgc/net.secbook/se01/handouts/Ch03-FilesystemSecurity.pdf
postmarketOS // real Linux distribution for phones
How to run sudo command with no password? - Ask Ubuntu
What are the differences between Tails and Whonix? - Tor Stack Exchange
sudoers hands-on and complete examples - How do I run specific sudo commands without a password? - Ask Ubuntu
Should I run Tor in a VM? - Tor Stack Exchange
Sudo and Sudoers Configuration | Servers for Hackers
Understanding the sudoers File – Viraj Khatavkar – Medium
How to run sudo command with no password? - Ask Ubuntu
Sudoers file, enable NOPASSWD for user, all commands - Ask Ubuntu
Sudoers file, enable NOPASSWD for user, all commands - Ask Ubuntu
Is it OK to set up passwordless `sudo` on a cloud server? - Server Fault
adding local content in /etc/sudoers.d/ instead of directly modifying sodoers file via visudo - definitive answer - Ask Ubuntu
What is the difference between the 'sudo' and 'admin' group? - Ask Ubuntu
What are the actual risks of giving www-data sudo nopasswd access? - Ask Ubuntu
How to avoid being prompted for a password by sudo? - Ask Ubuntu
Is disabling sudo password prompt a security risk? - Information Security Stack Exchange
What is the most secure way to use sudo permissions in a script? - Ask Ubuntu
ubuntu - Why does the system have /etc/sudoers.d? How should I edit it? edit sudoers from automated script- Super User
How to run a specific program as root without a password prompt? - Unix & Linux Stack Exchange
/etc/sudoers vs /etc/sudoers.d/ file for enabling sudo for a user - Unix & Linux Stack Exchange
Answer - Quora
How secure is NOPASSWD in passwordless sudo mode? - Information Security Stack Exchange
Different Types of RAM (Random Access Memory ) - GeeksforGeeks
Direct vs. Random Access - Computer Science Stack Exchange
Random-access memory - RAM - mémoire vive - Wikipedia
What is DRAM (Dynamic Random Access Memory) vs SRAM?
Freescale 68HC11 - Wikipedia
RAM vs ROM - Difference and Comparison | Diffen
Question - Quora
dma vs ram at DuckDuckGo
Jeremiah Grossman: WASC Threat Classification to OWASP Top Ten RC1 Mapping
OWASP/WASC Distributed Web Honeypots Project Re-Launch - Seeking Participants | Trustwave | SpiderLabs | Trustwave
freescale assembler at DuckDuckGo
Critical RCE Flaw in Linux APT Allows Remote Attackers to Hack Systems
Academic Trends in Digital Forensics - eForensics
Down the Security Rabbithole Blog - Supplemental: CWE Top 25 vs. OWASP Top 10 vs. WASC Classification
HTTPS In Development: A Practical Guide
How to choose the VPN that's right for you | ZDNet
IBM's First Commercial Quantum Computer
OWASP vs WASC
Federal Information Security Modernization Act | Homeland Security
FISMA Compliance Requirements - Download Cheat Sheet
Difference between IDS and IPS and Firewall - Information Security Stack Exchange
Home - Web Application Security Consortium
What is the difference between a HIDS/HIPS and an anti virus? - Information Security Stack Exchange
Host-based intrusion detection system - Wikipedia
EC-Council Certified Security Analyst - ECSA | EC-Council
You'd be surprised how many VPNs are owned by the same company
Using Emacs as a full-featured C/C++ IDE - Emacs Stack Exchange
How can I start learning Emacs Lisp? - Emacs Stack Exchange
Overview - CTF 101
Overview - CTF 101
Overview - CTF 101
Overview - CTF 101
Overview - CTF 101
Stack Canaries - CTF 101
CTF 101
What is the difference between analog and digital? | HowStuffWorks
radius cyber security at DuckDuckGo
Keystroke Encryption | ID Protection | Advanced Cyber Security Corp
Configuring McAfee ENS and VSE to Prevent Macroless Code Execution in Office Apps | Information Security, latest Hacking News, Cyber Security, Network Security
delete cronjob from script at DuckDuckGo
bash : Automate add/modify/delete of cron jobs from a script – The Unix Tips
elk log at DuckDuckGo
selks at DuckDuckGo
cyberark at DuckDuckGo
What is DLL Injection and how is it used for reversing? - Reverse Engineering Stack Exchange
DLL injection - Wikipedia
Intercepting GSM communications with an USRP and Gnu Radio - Reverse Engineering Stack Exchange
Where can I, as an individual, get malware samples to analyze? - Reverse Engineering Stack Exchange
How to identify if buffer allocate on stack or heap? - Reverse Engineering Stack Exchange
Academic journals for latest RE/Malware/Exploitation research? - Reverse Engineering Stack Exchange
Why stack canary can be brute-force one byte at a time? - Reverse Engineering Stack Exchange
Introducing the HorusLP Python Optimization Library | Toptal
MD5 and SHA-1 Still Used in 2018 - hash historical uses - edcc, fec - error detection
How to Find Your Netflix Freeloaders—and Kick Them Out | WIRED
track down mobile anonymous call site:security.stackexchange.com - Google Search
Stop reimplementing the virtual table and start using double dispatch – Andy G's Blog
Taming dynamic memory - Andreas Weis - Meeting C++ 2018 : Standard C++
How to trace a (mobile) phone? - Information Security Stack Exchange
Tracing the location of a mobile IP from an email - Information Security Stack Exchange
Is connecting to the Internet through a mobile connection using a non-registered SIM card perfectly anonymous? - Information Security Stack Exchange
Is a prepaid SIM-card with 3G data anonymous? - Information Security Stack Exchange
Tracking an IMEI or device from an IP address - Information Security Stack Exchange
Sign Up
Question - Quora
Ancient Babylonian Number System Had No Zero - Scientific American Blog Network
Number Systems and Bases – BetterExplained
Question - Quora
Ancient Numeration Systems
The Real Number System
Number - Wikipedia
Roman Numeral Arithmetic
How to write zero in the unary numeral system - Mathematics Stack Exchange
Arabic numerals - Wikipedia
Why are Roman numerals still used? - English Language & Usage Stack Exchange
Mayan Mathematics - The Story of Mathematics
Why is zero important? - Mathematics Stack Exchange
Forth (programming language) - Wikipedia
Setun - Wikipedia
Transistor - Wikipedia
Why do computers only use 0 and 1? - Electrical Engineering Stack Exchange
LSTI - PASSI
What do you do when you're not allowed to turn off the computer (but must)? - Super User
Consequences of turning off the pc while updating windows 10 - Microsoft Community
How strong is PDF security/encryption? - Information Security Stack Exchange
Why improvising your own Hash function out of existing hash functions is so bad - Information Security Stack Exchange
Why does some popular software still use md5? - Information Security Stack Exchange
Why is MD5 still used heavily? - Super User
DEFINITVE - Why are MD5 and SHA-1 still used for checksums and certificates if they are called broken? collision vs second pre image - integrity - hash
DEFINITIVE - Why do people still use/recommend MD5 if it has been cracked since 1996? Resistance to preimages/ second preimage / collision - compression function - password hashing security
How to securely hash passwords? - Information Security Stack Exchange
The difference between Encryption, Hashing and Salting
Is HMAC-MD5 still secure for commitment or other common uses? - Cryptography Stack Exchange
Use a combination of SHA1+MD5 - Stack Overflow
Hashing Is Not Encryption — Chris Tankersley — PHP Jack of All Trades
Yahoo breach: I’ve closed my account because it used MD5 to hash my password – Naked Security
Why You Shouldn't be using SHA1 or MD5 to Store Passwords - www.bentasker.co.uk
The Importance of Salting Stored Passwords And How To Do So Correctly - www.bentasker.co.uk
Question - Quora
MD5 - Wikipedia
SHA-1 -
Why I still use MD5
quantum computing
Pigeonhole principle - Wikipedia
Why does rsync still use MD5? md5 reliability for integrity checking
Outline of robotics - Wikipedia
Deprecated Linux Networking Commands and Their Replacements
Watch Boston Dynamics' Humanoid Robot Do Parkour
Can't ping other machines in my network - Super User
What's the relationship between a Linux OS and a kernel? - Stack Overflow
Raspberry Pi guide - The MagPi MagazineThe MagPi Magazine
Anybus X-gateway - Network to Network & IIOT Gateways
mask networking what is it for at DuckDuckGo
Getting started with software-defined networking | Opensource.com
The reason why Vizio smart TVs are so affordable: They track your data
12 signs you've been hacked -- and how to fight back | CSO Online
New Linux Systemd security holes uncovered | ZDNet
Linus Torvalds and others on Linux's systemd | ZDNet
Question - Quora
The Internal Processor Bus: data, address, and control bus
Question - Quora
Is the size of a memory address and size of the address bus related? - Super User
Question - Quora
Question - Quora
Inter-processor communication - embedded
Question - Quora
ntoh hton implementation - Google Search
Implementation of C Standard Library Function ntohl() - Code Review Stack Exchange
How are the ntoh functions implemented under RHEL/GCC? - Stack Overflow
What does htons() do on a Big-Endian system? - Stack Overflow
htons(), htonl(), ntohs(), ntohl()
Functions of the ntohl/htonl class and 64-bit values
Endianness conversion in C - Code Review Stack Exchange
Forced and easy hton/ntoh conversion - Code Review Stack Exchange
Same output for htonl() and ntohl() on an integer - Stack Overflow
endian
Basic concepts on Endianness - CodeProject
64 bit ntohl() in C++? - Stack Overflow
Detecting endianness programmatically in a C++ program - Stack Overflow
Bot Detection and Bot Protection - Protect Against Bot Attacks | PerimeterX
Turn a Raspberry Pi 3B+ into a PriTunl VPN | Opensource.com
Ransomware attack sends City of Del Rio back to the days of pen and paper | ZDNet
Understanding Routers, Switches, and Network Hardware
Answer - Quora
Log files: attacks & defenses (W38) - eForensics
Purple Teaming in Java API Development (W41) - Pentestmag
PenTest: Build Your Own Pentest Lab In 2019 - Pentestmag
Cyber Security is not an easy game – It’s an absolute endgame!
private server vs public server - Google Search
What's the Difference Between VPS and Cloud Servers?
Virtual Private Servers Vs. Dedicated Physical Servers
Test your private vs. public cloud knowledge
RSA Encryption Cracked Easily (Sometimes) | Hackaday
LoJax Malware Continues to Operate 8 Months After Discovery - ExtremeTech
The curious case of the Raspberry Pi in the network closet
New reverse proxy tool posted on Github can easily bypass 2FA and automate phishing attacks - TechSpot
10 Essential Software Engineering and Development Interview Questions and Answers
React Tutorial 2019: Part 1 | Toptal
Python and Finance: An Introductory Programming Tutorial | Toptal
[Les 100 de la cybersécurité] Les fournisseurs stratégiques - Les 100 de la Cyber
Hackers pwn Edge, Firefox, Safari, macOS, & VirtualBox at Pwn2Own 2018
bugcrowd vs zerodayinitiative vs hackerone at DuckDuckGo
36-Year-Old SCP Clients' Implementation Flaws Discovered
5 Popular Web Hosting Services Found Vulnerable to Multiple Flaws
The Evil-Twin Framework: A tool for improving WiFi security | Opensource.com
Twitter bug exposed private tweets of Android users to public for years
773 million records with emails & plain text passwords leaked online
Recaf - A Modern Java Bytecode Editor - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Trump's Missile Defense Plan Creates More Problems Than It Solves | WIRED
New Android Malware Apps Use Motion Sensor to Evade Detection
A Twitter Bug Left Android Users' Private Tweets Exposed For 4 Years
New ransomware steals PayPal data with phishing link in ransom note
Exploring C++20 - Class Types in Non-Type Template Parameters—Tobias Widlund : Standard C++
Be Careful Using Bots on Telegram | WIRED
Watch as hackers take over a construction crane
Ukrainian Police Arrest 6 Hackers Linked to DDoS and Financial Attacks
An Astonishing 773 Million Records Exposed in Monster Breach | WIRED
Unprotected Government Server Exposes Years of FBI Investigations
A 'Fortnite' Vulnerability Exposed Accounts to Takeover | WIRED
Hackers infect e-commerce sites by compromising their advertising partner
The Pirate Bay malware can empty your Cryptocurrency wallet
Malboxes - Builds Malware Analysis Windows VMs So That You Don'T Have To - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
How to Secure Your Mid-Size Organization From the Next Cyber Attack
Unpatched vCard Flaw Could Let Attackers Hack Your Windows PCs
Police Can't Force You To Unlock Your Phone Using Face or Fingerprint Scan
For Owners of Amazon's Ring Security Cameras, Strangers May Have Been Watching
Cyber Security Experts & Solution Providers | FireEye
Can Russian hackers be stopped? Here's why it might take 20 years - TechRepublic
.gov security falters during U.S. shutdown | Netcraft
Russia: Now everyone who uses a messaging app must be identifiable | ZDNet
Hacker 'BestBuy' sentenced to prison for operating Mirai DDoS botnet | ZDNet
Why-do-people-get-MacBooks-when-they-could-get-a-cheaper-and-more-powerful-Windows-laptop - Quora
7 tips to ace your tech job interview | Opensource.com
Exrex - Irregular Methods On Regular Expressions - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
PRETty - "PRinter Exploitation Toolkit" LAN Automation Tool - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Zerodium Offers to Buy Zero-Day Exploits at Higher Prices Than Ever
Ethereum Classic (ETC) Hit by Double-Spend Attack Worth $1.1 Million
Functional Programming Is Not a Silver Bullet—Jonathan Boccara : Standard C++
NSA to release free reverse engineering tool GHIDRA at RSAConference
How to manage your media with Kodi | Opensource.com
German Police Seek Help In Finding Parcel Bomber With MAC Address
20-Year-Old Man Arrested For Carrying Out Germany's Biggest Data Leak
Aztarna - A Footprinting Tool For Robots - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Automating deployment strategies with Ansible | Opensource.com
Now available: The open source guide to DevOps security | Opensource.com
WhatsApp Gold Scam is Back with Malware Payload
Zerodium is paying $2 million for Apple iOS remote jailbreak
CppCast Episode 182: Trivially Relocatable with Arthur O’Dwyer : Standard C++
Anonymous hacker jailed for 10 years over hospital DDoS attacks
A Worldwide Hacking Spree Uses DNS Trickery to Nab Data | WIRED
US government shutdown leaves websites insecure - BBC News
Does WhatsApp Has A Privacy Bug That Could Expose Your Messages?
DDoSing Hospital Networks Landed This Hacktivist in Jail for Over 10 Years
What is a certificate? | Opensource.com
Your Old Tweets Give Away More Location Data Than You Think | WIRED
Over 202 Million Chinese Job Seekers' Details Exposed On the Internet
New Systemd Privilege Escalation Flaws Affect Most Linux Distributions
Hackers Using Zero-Width Spaces to Bypass MS Office 365 Protection
What is DevSecOps? | Opensource.com
5 useful Vim plugins for developers | Opensource.com
Carriers Swore They'd Stop Selling Location Data. Will They Ever? | WIRED
Turns Out Kaspersky Labs Helped FBI Catch Alleged NSA Leaker
Google DNS Service (8.8.8.8) Now Supports DNS-over-TLS Security
A Growing Frontier for Terrorist Groups: Unsuspecting Chat Apps | WIRED
Aussie govt emergency service hacked to send fake warning alerts
while (1) Vs. for (;;) Is there a speed difference? - Stack Overflow
Ethereum Plans to Cut Its Absurd Energy Consumption by 99 Percent - IEEE Spectrum
Flaw in Skype for Android exposes photos and contacts
AI Will Create Millions More Jobs Than It Will Destroy. Here's How
La reconnaissance faciale comme méthode de sécurité est inutile pour 4 smartphones sur 10, d'après une étude
« Fortnite », « PUBG », « League of Legends »... La DGSE recrute pour hacker les jeux vidéo multijoueurs, mais dans quel but ?
Facebook Knows How to Track You Using the Dust on Your Camera Lens
ifconfig : Command 'ifconfig' is available in '/sbin/ifconfig' - Ask Ubuntu
/sbin directory definition, by The Linux Information Project (LINFO)
Purple Teaming in Java API Development (W41) - Pentestmag
https://www.google.com/url?q=https://www.infineon.com/dgdl/RF2ir%2520WhitePaper%2520V1.0.pdf%3FfileId%3Ddb3a30432b57a660012b5c16272c2e81&sa=U&ved=2ahUKEwj5sODJuN3fAhWPx4UKHZtyB-oQFjADegQICBAB&usg=AOvVaw3J3PwfuZloaLXs0AlaVPzH
security aspects remote control infrared - Google Search
infra red temote controller how does it work at DuckDuckGo
How to downgrade a package via apt-get? - Ask Ubuntu
Social Media and Instant Message Forensics - eForensics
A Fast and Powerful JavaScript SDK for Your JSON API | Toptal
How to find the true location of your VPN servers | TechRadar
GitHub - AlessandroZ/BeRoot: Privilege Escalation Project - Windows / Linux / Mac
Comment les experts en sécurité remontent la piste des hackers
Microsoft, Google Use Artificial Intelligence to Fight Hackers
If you don't like where you are, move. You are not a tree.
The Dark Overlord Decrypts More 9/11 Insurance Files - Motherboard
Proton/README.md at proton_3.16 · ValveSoftware/Proton · GitHub
Apple CEO Tim Cook Is Calling For Bloomberg To Retract Its Chinese Spy Chip Story
https://www.developpez.net/forums/attachments/p437717d1546244997/club-professionnels-informatique/actualites/certaines-applications-l-ecosysteme-android-echangent-donnees-facebook/rapport-privacy-international.pdf/
Comment certaines applications Android échangent des données avec Facebook, en particulier pour les mobinautes qui n'ont pas de compte Facebook ?
Combien faudrait-il vous payer pour que vous désactiviez votre compte Facebook pendant un an ? voici les résultats d'une recherche à ce propos
Voici 6 raisons pour lesquelles Huawei donne aux États-Unis et à ses alliés des cauchemars en matière de sécurité informatique
If China Hacked Marriott, 2014 Marked a Full-on Assault | WIRED
The Worst Hacks of 2018: Marriott, Atlanta, Quora, and More | WIRED
Troubleshooting hardware problems in Linux | Opensource.com
What is a Linux server and why does your business need one? | Opensource.com
What is an Allocator?—Vanand Gasparyan : Standard C++
Why data scientists love Kubernetes | Opensource.com
Adobe Issues Emergency Patches for Two Critical Flaws in Acrobat and Reader
Google fixes critical vulnerability in Chrome for Android after 3 years
The Elite Intel Team Still Fighting Meltdown and Spectre | WIRED
PewDiePie hackers take over Google smart TV systems - BBC News
How to use Magit to manage Git projects | Opensource.com
MISP - Malware Information Sharing Platform and Threat Sharing - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Hot sysadmin reads for the new year | Opensource.com
Tor Is Easier Than Ever. Time to Give It a Try | WIRED
EU To Offer Almost $1M In Bug Bounties On Open Source Software
FOSSA - Open Source Management for Modern Development
These VPNs Will Keep Your Browsing Totally Private | Inverse
This data-stealing Android malware infiltrated the Google Play Store, infecting users in 196 countries | ZDNet
Cookie Based Self-XSS to Good XSS – hyde – Medium
Bitcoin Ransom: Hacker Group Releases Layer 1 Of “Damaging” 9/11 Papers
market oriented economy at DuckDuckGo
Steemit - Wikipedia
What is a Netmask?
Understanding TCP/IP addressing and subnetting basics
What is a Subnet Mask? - Definition from Techopedia
Chapter 16. Boost.Interprocess - 1.62.0
Auto – entrepreneur ou entreprise individuelle? Les différences
encrypt bookmarks at DuckDuckGo
8 Ways To Brighten Your Family’s Winter
Common issues with 2-Step Verification - Google Account Help
Google wants you to bid farewell to SMS authentication – Naked Security
Google Authenticator — Krebs on Security
10 Essential Mobile App Interview Questions and Answers
How to Hack Any Account That Has Recovery via Phone Option Enabled (SMS) On Android: « Null Byte :: WonderHowTo
IT-Security ~ Two Factor Authentication ~ Encryption
Why should I use the Google Authenticator app instead of SMS? - Web Applications Stack Exchange
Is Google prompt safer then authenticator app for 2-step verification? - Information Security Stack Exchange
NFC SD and SIM Cards - NearFieldCommunication.org
How secure is Yahoo Account Key? - Information Security Stack Exchange
Smart card - Wikipedia
Subscriber identity module - Wikipedia
Time-based One-time Password algorithm - TOTP - Wikipedia
Answer - Quora
(PDF) On SCADA PLC and Fieldbus Cyber-Security
Answer - Quora
Hackers pocketed $878,000 from cryptocurrency bug bounties in 2018
AdGuard officially releases its own DNS service, and it works with Android Pie
4 critical steps to building an IoT network | BetaNews
How to Create a Virtual HardDisk Volume Using a File in Linux
Trackerjacker - Like Nmap For Mapping Wifi Networks You'Re Not Connected To, Plus Device Tracking - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
BadMod - Detect Website CMS, Website Scanner & Auto Exploiter - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Photon - Incredibly Fast Crawler Which Extracts Urls, Emails, Files, Website Accounts And Much More - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
SocialFish - Ultimate phishing tool with Ngrok integrated - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
How Meltdown and Spectre Were Independently Discovered By Four Research Teams At Once | WIRED
Critical "Meltdown" and "Spectre" Flaws Break Basic Security for Intel, AMD, ARM Computers | WIRED
The Untold Story of NotPetya, the Most Devastating Cyberattack in History | definitive narrative of the cyberattack
Firejail - Securely Run Untrusted Applications in Linux
How To Parallelise CSV Reader with C++17 - new chapter in C++17 in Detail : Standard C++
We’re all Just Starting to Realize the Power of Personal Data | WIRED
North Korea defector hack: Personal data of almost 1,000 leaked - BBC News
EagleEye - Stalk Your Friends. Find Their Instagram, FB And Twitter Profiles Using Image Recognition And Reverse Image Search - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Hijacker v1.5 - All-in-One Wi-Fi Cracking Tools for Android - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
LOIC 1.0.8 (Low Orbit Ion Cannon) - A network stress testing application - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Trape - People tracker on the Internet (The evolution of phishing attacks) OSINT - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
BlackEye - The Most Complete Phishing Tool, With 32 Templates +1 Customizable - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Mercury - A Hacking Tool Used To Collect Information And Use The Information To Further Hurt The Target - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
VOOKI - Web Application Vulnerability Scanner - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Devploit v3.6 - Information Gathering Tool - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Tinfoleak v2.4 - The Most Complete Open-Source Tool For Twitter Intelligence Analysis - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
ANDRAX - The First And Unique Penetration Testing Platform For Android Smartphones - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
SocialBox - A Bruteforce Attack Framework (Facebook, Gmail, Instagram, Twitter) - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Th3Inspector - Tool for Information Gathering - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Pure Blood v2.0 - A Penetration Testing Framework Created For Hackers / Pentester / Bug Hunter - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Wifite 2.1.0 - Automated Wireless Attack Tool - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Infection Monkey - An Automated Pentest Tool - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Remarkable problem-solving ability of unicellular amoeboid organism and its mechanism | Royal Society Open Science
GitHub - jdf76/plugin.video.youtube: Kodi's Youtube Plugin -- Please Check the forums before submitting an issue
realtek driver audioendpoint.inf at DuckDuckGo
Windows Command Prompt / cmd Cheat Sheet - The Hackr
Launch computer management from Run window
Cheat Sheet for Windows Command Prompt
msc vs exe at DuckDuckGo
command line cheat sheet windows at DuckDuckGo
Hack Facebook password with android phone [7 101% working ways]
Using JavaScript to hack the web | Opensource.com
22 SSH Examples, Practical Tips & Tunnels | HackerTarget.com
Hijacking Online Accounts Via Hacked Voicemail Systems | Threatpost | The first stop for security news
A look at community-powered VPN Penguin Proxy - gHacks Tech News
How to Hack Facebook Account: Hacking Methods That Work
» Mimikatz » Active Directory Security
Answer - Quora
red team vs blue team at DuckDuckGo
GitHub - ipfs-search/ipfs-search: Search engine for the Interplanetary Filesystem.
Open Semantic Search: Your own local search engine for documents, images, tables, files, intranet & news
SoftPerfect : software for networks, enterprises and developers
Web based file search in the lan? - Server Fault
Searx instances · asciimoo/searx Wiki · GitHub
solr vs searx at DuckDuckGo
esb vs fieldbus at DuckDuckGo
usb vs pci - Google Search
Enterprise service bus - Wikipedia
Windows 10 Tips, Tricks, Help, Support, Downloads, Features
Drive-Thru Systems | Pro Audio Equipment | Restaurant Pagers | HME
Hackers conducting botnet attacks through 20k hacked WordPress sites
DuckDuckGo study claims Google Incognito searches are not private
https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-lee.pdf
Run-time type information - Wikipedia
Early binding and Late binding in C++ - GeeksforGeeks
Dynamic dispatch - polymorphism - vtable C++
Big Picture Issues, C++ FAQ
In C++ why and how are virtual functions slower? - Software Engineering Stack Exchange
Theory of computation | Halting Problem - GeeksforGeeks
Halting problem - Wikipedia
how c++ implements dynamic binding internally? - Stack Overflow
How C++ reference works - Stack Overflow
Reference (C++) - Wikipedia
What and where are the stack and heap? - Stack Overflow
References, C++ FAQ
What is the difference between ++i and i++? - Stack Overflow
Incrementing iterators: Is ++it more efficient than it++? - Stack Overflow
Efficiency versus intent | Dr Dobb's
What are the fundamental differences between C and C++? - Software Engineering Stack Exchange
The C Programming Language - Wikipedia
System programming - Wikipedia
Difference between postfix and prefix increment of stl iterators? - Stack Overflow
postfix and prefix increment operator in a for loop - Stack Overflow
Line editor - Wikipedia
Question - Quora
PenTest: Red Team/Blue Team - Scenarios, Tutorials, and Case Studies - Pentestmag
When do you use float and when do you use double - Software Engineering Stack Exchange
Cryptography failure leads to easy hacking for PlayStation Classic – Ars Technica
ARK and Bugcrowd Go Hunting! – ARK.io | Blog
These hackers are using Android surveillance malware to target opponents of the Syrian government | ZDNet
Hack the Box: Solid State Walkthrough – Deceptive Security
gold (linker) - Wikipedia
socat/EXAMPLES at master · craSH/socat · GitHub
December 2015 Ukraine power grid cyberattack - Wikipedia
build road from gps coordinates coordinates c++ at DuckDuckGo
Google bomb - Wikipedia
ServerGUI - Community Help Wiki
ar (Unix) - Wikipedia
ar vs tar at DuckDuckGo
lighttpd - Wikipedia
Why is Nginx more popular than lighttpd? - Server Fault
How to upload local file to server through Linux terminal - Super User
How to install a deb file, by dpkg -i or by apt? - Unix & Linux Stack Exchange
Break the code and exploit it - Hakin9 - IT Security Magazine
Resize & Create Partitions in Debian - Wiki
how to format NTFS partition in Debian? - Super User
How To Partition and Format Storage Devices in Linux | DigitalOcean
format partition debian at DuckDuckGo
umount command vs Nautilus linux at DuckDuckGo
What is the difference between TAR vs CPIO archive file formats? - Super User
Creating ext4 partition from console - Super User
Terminal method of formatting storage drive - Ask Ubuntu
C.3. Recommended Partitioning Scheme
Linux Hard Disk Format Command - nixCraft
Fourth Extended File System (EXT4) Forensics (W36) - eForensics
What is the difference between "Unmount", "Eject", "Safely Remove Drive" and the eject icon? - Ask Ubuntu
How to mount from command line like the Nautilus does? - Stack Overflow
Question - Quora
Set-top box - Wikipedia
bootloader encryption at DuckDuckGo
ext4 live encryption at DuckDuckGo
filesystem security at DuckDuckGo
f2fs vs ext4 at DuckDuckGo
Answer - Quora
Flutter - Beautiful native apps in record time
[1711.05824] Security Issues in Controller Area Networks in Automobiles
what is an init system linux at DuckDuckGo
upstart vs system d - Google Search
systemd vs sysv vs lsb init at DuckDuckGo
systemd must die - Google Search
shutdown command source code linux at DuckDuckGo
shutdown: What is difference between "Power Off" and "Halt"? - Server Fault
What is the difference between Halt and Shutdown commands? - Unix & Linux Stack Exchange
halt command vs shutdown linux at DuckDuckGo
in shell how can I tell the difference between a directory and a file - Super User
Question - Quora
quora tar vs gz zip at DuckDuckGo
systemd must die - Google Search
systemd - Debian Wiki
systemd - ArchWiki
Eject / safely remove vs umount - Unix & Linux Stack Exchange
Linux (Ubuntu): safely remove USB flash disk via command line - Stack Overflow
Safely remove usb from linux device - Unix & Linux Stack Exchange
What's the difference between ROS2 and DDS? - Stack Overflow
OpenDDS
How do I use pushd and popd commands? - Unix & Linux Stack Exchange
Data Distribution Service - Wikipedia
Question - Quora
Bash Reference Manual: The Directory Stack
Using pushd and popd - Unix & Linux Stack Exchange
Use 'pushd' and 'popd' for Efficient Filesystem Navigation in Linux
xdotool at DuckDuckGo
What are the differences between xdotool and xautomation? - Unix & Linux Stack Exchange
Gopher (protocol) - Wikipedia
IBM Domino - Overview - United States
sage x3 server at DuckDuckGo
zip vs tar vs targz at DuckDuckGo
What's the difference between .tar.gz and .gz, or .tar.7z and .7z? - Ask Ubuntu
SOC 2 vs ISO 27001: Key Differences Between the Standards | Reciprocity
Hacking Articles - Raj Chandel's Blog
Multiple Ways to Exploit Tomcat Manager
What is the difference between CAN and ARINC? - Aviation Stack Exchange
Facebook bug exposed private photos of 6.8M users to third-party developers
Facebook Exposed 6.8 Million Users' Photos to Cap Off a Terrible 2018 | WIRED
New Shamoon Malware Variant Targets Italian Oil and Gas Company
Fake Bomb Threat Emails Demanding Bitcoins Sparked Chaos Across US, Canada
NETworkManager - A Powerful Tool For Managing Networks And Troubleshoot Network Problems! - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
A critical bug in Microsoft left 400M accounts exposed
https://www.hackread.com/android-malware-steals-paypal-funds-of-victims/
https://www.hackread.com/playstation-classic-hacked-platform-free-console/
Course | 6.431x | edX
https://opensource.com/article/18/12/how-get-started-ai
Encrypted Messaging App Signal Says It Won’t Comply With Australia’s New Backdoor Bill - Motherboard
How one hacked laptop led to an entire network being compromised | ZDNet
How to Enable Monitor Mode & Packet Injection on the Raspberry Pi « Null Byte :: WonderHowTo
A general reinforcement learning algorithm that masters chess, shogi, and Go through self-play | Science
SOC 2 vs. ISO 27001 Certification: The Key Differences
What is the difference between SOC 2 and SOC for Cybersecurity? – risk3sixty LLC
SOC 2 vs SOC for Cybersecurity: 3 Main Differences - A-LIGN
How To Use Netcat to Establish and Test TCP and UDP Connections on a VPS | DigitalOcean
Listen to port continuously and dump data to file - Super User
Continuously listen to tcp port via terminal - Stack Overflow
netcat listen to port at DuckDuckGo
half-duplex and full-duplex Ethernet vs Switches and Hubs - Server Fault
Do You Know the Difference Between Hub, Switch & Router?
What's the Difference: Hub vs Switch vs Router
Identify the device if it is hub, switch, router or gateway - Super User
how to know if a hub is a switch at DuckDuckGo
GPS coordinates (lat/long/altitude) to Unity 3D coordinates (x, y, z) - Unity Answers
Display GPS position of user using c++
imaginaryC2 - Tool Which Aims To Help In The Behavioral (Network) Analysis Of Malware - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Exclusive: China hacked HPE, IBM and then attacked clients - sources | Reuters
ip route command at DuckDuckGo
ss command at DuckDuckGo
How do I interpret the results of the `ls -l` command? - Super User
Understanding of ls command with a long listing format output with permission bits - LinuxConfig.org
Getting around the FAT32 4GB file size limit - Super User
Why are FAT32 disks limited to 4GB files? - Stack Overflow
FBI swoops on 'national threat' 'hacks for hire' sites - BBC News
Ustealer - Ubuntu Stealer, Steal Ubuntu Information In Local PC - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
http://www.cs.umsl.edu/~sanjiv/classes/cs2750/lectures/re.pdf
perlre - perldoc.perl.org
Newest 'regex' Questions - Stack Overflow
Domain Parked With VentraIP Australia
Regex Tester - Javascript, PCRE, PHP
DEFINITIVE - Online regex tester and debugger: PHP, PCRE, Python, Golang and JavaScript - SED, code generator
What do the fields in ls -al output mean? device file, character, block, regular
Do USB ports need Drivers? - [Solved] - Systems - Tom's Hardware
How China’s Elite APT10 Hackers Stole the World’s Secrets | WIRED
US Indicts Two Chinese Government Hackers Over Global Hacking Campaign
FBI Seizes 15 DDoS-For-Hire Websites, 3 Operators Charged
An Extraterrestrial Guide to C++ Formatting—Victor Zverovich : Standard C++
How to build a JIT compiler in C++ with LLVM—Mark Leone : Standard C++
Australia Passes Anti-Encryption Bill—Here's Everything You Need To Know
Australia's Encryption-Busting Law Could Impact Global Privacy | WIRED
Madrid Cpp meetup: Bare metal programming : Standard C++
Data Breaches: The Complete WIRED Guide | WIRED
Building a Web Scraper from start to finish – Hacker Noon
Quick Q: What does it mean to return a reference? : Standard C++
Cyber Defenders 2018 Report
Difference between libinput and evdev?
Answer - Quora
Answer - Quora
The International Obfuscated C Code Contest
“Smart” Cities And Buildings: The Emergence Of The Cyber Safe Building - Hakin9 - IT Security Magazine
Remote Code Execution Vulnerability in the Austrian Electronic Banking Application ELBA5 - Pentestmag
China’s brightest children are being recruited to develop AI ‘killer bots’ | South China Morning Post
Fourth Extended File System (EXT4) Forensics (W36) - eForensics
https://grid.cs.gsu.edu/~agb/csc4210/Chap3.pdf
https://www.google.com/url?q=http://www.ncsa.illinois.edu/People/kindr/teaching/ece190_sp11/lectures/lecture_02.pdf&sa=U&ved=2ahUKEwjTwOGo04HfAhUBYxoKHfxVCOAQFjAIegQIARAB&usg=AOvVaw0nvjnMIFMtjsBWTImZejPH
9 top tech-recruiting mistakes to avoid | Opensource.com
String interpolation - Wikipedia
https://motherboard-vice-com.cdn.ampproject.org/v/s/motherboard.vice.com/amp/en_us/article/evw93z/researchers-finally-proved-quantum-computers-are-more-powerful-than-classical-computers?amp_js_v=a2&amp_gsa=1#referrer=https%3A%2F%2Fwww.google.com&amp_tf=From%20%251%24s&ampshare=https%3A%2F%2Fmotherboard.vice.com%2Fen_us%2Farticle%2Fevw93z%2Fresearchers-finally-proved-quantum-computers-are-more-powerful-than-classical-computers
Answer - Quora
Supply chain attack - Wikipedia
Hacker says he'll livestream deletion of Zuckerberg's Facebook page
Une société de spyware a exposé des « téraoctets » de données personnelles, y compris des selfies, des messages texte et des données de localisation
Newbie Hacker Fingered for Monster Botnet
Is Julia the next big programming language? MIT thinks so, as version 1.0 lands - TechRepublic
apt28 hacker group at DuckDuckGo
Learn to Hack
New tech lets submarines 'email' planes - BBC News
Hackers can intercept and manipulate DNS queries, researchers warn
IoT botnet of heaters & ovens can cause massive widespread power outages
How to Protect Your Phone Against a SIM Swap Attack | WIRED
Code injection - Data sanitization - privilege escalation - setuid root - SQL, LDAP, XPath, or NoSQL queries; OS commands; XML parsers, SMTP headers, program arguments are very exposed - eval() function injection vulnerbaility
Return-oriented programming - Wikipedia
Wireless Security & Hacking (W31) - Hakin9 - IT Security Magazine
WIRED
WIRED
NSA Leaker 'Reality Winner' Gets More Than 5 Years in Prison
WIRED
WIRED
New Android Malware Framework Turns Apps Into Powerful Spyware
Decrypting FDE in Disaster Recovery - Information Security Stack Exchange
Decrypting keys wrapped by the Storage Root Key (SRK) of a TPM - Information Security Stack Exchange
Android Rooting and Evil Maid Attacks - Information Security Stack Exchange
Does Android encryption really prevent law enforcement access? - Information Security Stack Exchange
What are methods to protecting an android phone from law enforcement - Information Security Stack Exchange
Android: Are locally-stored encryption keys readable by attacker who gained root access? - Information Security Stack Exchange
Bypass SSL Certificate Pinning using SSL Vulnerablilities - Information Security Stack Exchange
Conduct search engine discovery/reconnaissance for information leakage (OTG-INFO-001) - OWASP
Domain hijacking - phishing, spoofing, credentials theft
Kaspersky Lab: North Korea Hacks Cryptocurrency Exchange With ‘First’ macOS Malware
Foreign function interface - FFI - Java Native Interface JNI - SWIG - CLR
Heap feng shui - Wikipedia
Heap feng shui - Wikipedia
Arbitrary/Remote code execution - ACE/RCE
Des chercheurs trouvent le moyen de contourner les mécanismes de protection contre le pistage, offert par sept navigateurs et 46 extensions
Une nouvelle vulnérabilité vient d'être découverte sur macOS, elle permettrait de compromettre l'entièreté du système d'exploitation
73 % des brèches de sécurité dans les réseaux d'entreprises sont dues aux applications web selon Kaspersky Lab
Un gamin de 16 ans accusé d'avoir piraté les serveurs d'Apple pendant des mois et dérobé 90 Go de données est actuellement jugé en Australie
Livres Sécurité : Sécurité offensive (Pentesting/Ethical hacking)
The pros and cons of using VPNs
Are there technical reasons why state actors may be more able of carrying out malware cyberattacks against critical infrastructure, than individuals? - Information Security Stack Exchange
How Do Rootkits & Other Low-Level Malware Still Manage to Load on Systems Protected by Secure Boot (and TB/MB)? - Information Security Stack Exchange
How secure are most FDE implementations? - Information Security Stack Exchange
How can the Equation Group HDD firmware malware help bypass FDE? - Information Security Stack Exchange
When using FDE, is there any OS/software allowing to get back from hibernation without requiring the disk encryption key? - Information Security Stack Exchange
Does ssh-agent store the SSH key passwords in cleartext in the memory? - Information Security Stack Exchange
Is an encrypted partition significantly less secure than full drive encryption? - Information Security Stack Exchange
What's the security implication of having an unlocked boot loader? - Android Enthusiasts Stack Exchange
Android FDE - Why is key stored in RAM at all? - Information Security Stack Exchange
c program triggering nx protection at DuckDuckGo
Non-Executable or NX Stack is a myth for Protection against Buffer Overflows | Deepanshu Khanna | LinkedIn
NX bit - Harvard/von Neumann CPU architectures - executable space protection - XD execute disable bit - Enhanced Virus Protection EVP - XN execute never
Control-flow integrity - Wikipedia
Buffer overflow protection - Wikipedia
Executable space protection - Wikipedia
Stack Overflow - Wikipedia
Une vulnérabilité inhérente à PHP met à risque des millions de sites web WordPress et l'équipe du CMS ne l'a toujours pas corrigée depuis 2017
Android Rooting and Evil Maid Attacks
Popular Kodi add-on 'phones home' -- and could get you into serious legal trouble
Facebook Fighting FBI Over Encrypted Messages: Report
HackNotice Alerts You When a Site is Hacked or Your Info is Leaked
WIRED
WIRED
Google Tracks Android, iPhone Users Even With 'Location History' Turned Off
Hackers can manipulate Police body cam footages
ex-NSA Hacker Discloses macOS High Sierra Zero-Day Vulnerability
Flaws in Pre-Installed Apps Expose Millions of Android Devices to Hackers
A sysadmin’s handy cheat sheet for SELinux | Opensource.com
Tips for using the top command in Linux | Opensource.com
Malicious faxes leave firms 'open' to cyber-attack - BBC News
WIRED
WIRED
WIRED
WIRED
Invisible Mouse Clicks Let Hackers Burrow Deep into MacOS | WIRED
Police Bodycams Can Be Hacked to Doctor Footage | WIRED
Chrome Bug Allowed Hackers to Find Out Everything Facebook Knows About You
FBI sought Google location data of many to catch robber - BBC News
Ex-NSA hacker proves how easily macOS user warnings can be bypassed by malware
President Trump relaxes US cyber-attacks rules - BBC News
WIRED
15 Tips On How to Use 'Curl' Command in Linux
New Intel chip flaw "Foreshadow" attacks SGX technology to extract sensitive data
CppCon 2017: How to break an ABI and keep your users happy—Gennadiy Rozental : Standard C++
Mystery Russian satellite's behaviour raises alarm in US - BBC News
Widespread Instagram Hack Locking Users Out of Their Accounts
Wi-fi could be used to detect weapons and bombs - BBC News
Email Phishers Using New Way to Bypass Microsoft Office 365 Protections
Foreshadow Attacks — 3 New Intel CPU Side-Channel Flaws Discovered
WIRED
Millions of Android Devices At Risk of Man-in-the-disk Attack
Google tracks users who turn off location history - BBC News
How to Install Latest MySQL 8.0 on RHEL/CentOS and Fedora
Hackers can compromise your network just by sending a Fax
https://opensource.com/article/18/8/automate-backups-raspberry-pi
New Man-in-the-Disk attack leaves millions of Android phones vulnerable
Why some computer viruses refuse to die - BBC News
Defcon: 11-year-old modifies Florida Presidential voting results
16-Year-Old Teen Hacked Apple Servers, Stole 90GB of Secure Files
How Google’s location-tracking issue affects you
Quick Q: What are copy elision and return value optimization? : Standard C++
WIRED
16-year old compromised Apple networks to steal GBs of sensitive data
Apple files stored by teen in 'hacky hack hack' folder - BBC News
How to Avoid Odometer Fraud: 7 Steps (with Pictures) - wikiHow
PenTest: Machine Learning, Deep Learning and Cybersecurity - Pentestmag
Neto - A Tool To Analyse Browser Extensions - KitPloit - PenTest Tools for your Security Arsenal ☣
US military draws up 'do not buy' list for software - BBC News
Spectre attack variant can be remotely mounted to extract sensitive data
Equifax's Security Overhaul, a Year After Its Epic Breach | WIRED
How to Hack (Legally) & Get Paid For It | PCWorld
Prisoners exploit tablet vulnerability to steal nearly $225K – Naked Security
A single-user, lightweight OS for your next home project | Opensource.com
Understanding Nmap Packet Trace
Why you're using Tor wrong | ZDNet
The Fundamentals of FDE: Comparing the Top Full Disk Encryption Products | Trusted Computing Group
Trusted Platform Module - Wikipedia
ssl pinning bypassing at DuckDuckGo
Home
Security with HTTPS and SSL  |  Android Developers
Bypassing SSL Pinning in Android Applications – serializethoughts
Chain of trust - Wikipedia
GitHub - iSECPartners/android-ssl-bypass: Black box tool to bypass SSL verification on Android, even when pinning is used.
https://www.guardsquare.com/en/blog/iOS-SSL-certificate-pinning-bypassing?gclid=EAIaIQobChMI3-DZ5vTB3AIVaLvtCh3lMAuyEAEYASAAEgKeWfD_BwE
Software agent - Wikipedia
Internet bot - web robot, WWW robot - Mostly used in web spidering/crawling - robots.txt - Used in Instant Messaging IM and IRC - Wikipedia
Web crawler - Wikipedia
Zombie (computer science) - Wikipedia
https://security-assessment.com/files/documents/whitepapers/Bypassing%20SSL%20Pinning%20on%20Android%20via%20Reverse%20Engineering.pdf
Reverse engineering and removing Pokémon GO’s certificate pinning | Eaton Works
Nick Fishman — Reverse Engineering Native Apps by Intercepting...
Man-in-the-middle proxy without any certificate errors? - Super User
why is it always possible to disassemble but not always possible to decompile at DuckDuckGo
bypass ssl pinning at DuckDuckGo
bypass tls pinning at DuckDuckGo
build twitter bot at DuckDuckGo
build private api bot at DuckDuckGo
What is certificate pinning? - Information Security Stack Exchange
Does a TLS interception proxy present the user's browser with the end server's certificate? - Information Security Stack Exchange
What HPKP is but isn’t
Disable HSTS and HPKP - Server Fault
TOFU - MDN Web Docs Glossary: Definitions of Web-related terms | MDN
reverse engineer http public key pinning at DuckDuckGo
Is HTTP Public Key Pinning Dead? | Qualys Blog
Android Security: SSL Pinning – Matthew Dolan – Medium
Prevent bypassing of SSL certificate pinning in iOS applications | Guardsquare
reddit: the front page of the internet
Who and how is using forged SSL certificates worldwide?
HTTP Public Key Pinning (HPKP)
HTTP Public-Key-Pinning explained - The what, why, and how of RFC 7469 - Tim Taubert
Be Afraid Of HTTP Public Key Pinning (HPKP) — Smashing Magazine
Certificate and Public Key Pinning - OWASP
Pinning Cheat Sheet - OWASP
Could a compromised root CA impersonate any SSL certificate? - Stack Overflow
Do client certificates provide protection against MITM? - Information Security Stack Exchange
Same-origin policy - Wikipedia
Certificate Transparency - Wikipedia
HTTP Strict Transport Security - Wikipedia
Support certificate pinning · Issue #101 · bitwarden/core · GitHub
HTTP Public Key Pinning - Wikipedia
HTTP Public Key Pinning (HPKP) - HTTP | MDN
Chistory
iterating in loop whith pointer c at DuckDuckGo
diminished radix complement proof at DuckDuckGo
What is a Ray ID (Cloudflare)? - Stack Overflow
Open Source Hacking Tools - Hakin9 - IT Security Magazine
Quelle est la différence entre Modem et Routeur? - L'actualité Geek, Web, Mobile, Jeux-vidéos et High Tech
Routeur WiFi, Modem, Switch et Box : Quelle différence ?
How To Forward a Port
router vs modem vs dsl at DuckDuckGo
différence box internet routeur - Google Search
Box, routeur et modem : quelle différence entre ces équipements ?
Stack overflow on your terminal in 5 easy steps – Abhishek – Medium
Oracle fixes Solaris vulnerability that could allow kernel level privilege escalation | ZDNet
Insecure server left carmakers' trade secrets wide open - Security - iTnews
How to encrypt your entire life in less than an hour
How I hacked Google’s bug tracking system itself for $15,600 in bounties
Resources for WEB APPLICATION PENETRATION TESTING – Yadav667 – Medium
The call is coming from inside the house — DNS rebinding in EOSIO keosd wallet
Hack the Violator (CTF Challenge)
How do hackers hack? - Quora
why passwords are not stored in plaintext at DuckDuckGo
hashing function vs surjective function at DuckDuckGo
How to use your Android smartphone camera as webcam
How to Use an Android Phone As a Webcam For PC [Windows & Linux]
How to Use Your Phone as a Webcam | NDTV Gadgets360.com
How to turn your Android smartphone into a webcam for your Windows PC | Digital Citizen
How to Use Any Smartphone as a webcam
How to Use Your Smartphone as Webcam on PC Or Laptop » TechWorm
How to use your Android as a Webcam - CNET
How to Use Your Smartphone as a Webcam for Your Computer
How to Use an Android Device as a PC Webcam
How to Use Your Android Device as a Security Camera
How to Turn Your Smartphone into a Wireless Webcam with These 5 Apps « Smartphones :: Gadget Hacks
Less Repetition, More Dynamic Programming – basecs – Medium
Watch a Hacker Install a Firmware Backdoor on a Laptop in Less Than 5 Minutes - Motherboard
Half a billion enterprise IoT devices vulnerable to DNS rebinding attacks
How to prove correctness of algorithm – Hanh D. TRAN – Medium
The Secret Internet War Over Bots
BLAST COURSE: Drone Wi-Fi Hacking (W33) - Hakin9 - IT Security Magazine
Crawlera
DNS rebinding attack puts half a billion IoT devices at risk
WIRED
How to Teach Your Employees About Cybersecurity
New sextortion scheme uses victims' real password for blackmailing
Road navigation systems can be spoofed using $223 equipment
WIRED
A highly targeted malware campaign is spying on 13 iPhones in India
Experimenting your way to achieving business goals | Opensource.com
Intercepting SSL And HTTPS Traffic With mitmproxy and SSLsplit
Understand And Prevent MITM/Sniffing Attacks – Procurity
Man-in-the-middle attack - OWASP
Does https prevent man in the middle attacks by proxy server? - Information Security Stack Exchange
What is SSL Sniffing | Thwart Sniff with HTTPS or SSL Certificates
https://opensource.com/article/18/7/powershell-tips
http://feedproxy.google.com/~r/TheHackersNews/~3/LNZpk02cKFM/luminositylink-hacking-tool.html
21-Year-Old Creator of LuminosityLink Hacking Tool Pleads Guilty
Amazon faces web issues around the world on Prime Day - BBC News
Full C++17 Filesystem Library Guide—Nico Josuttis : Standard C++
WIRED
Seeker - Find GeoLocation With High Accuracy - KitPloit - PenTest Tools for your Security Arsenal ☣
Cyber Security Training Courses – CISA, CISM, CISSP Certifications
Hacker Sells 2FA bypass flaw in Poloniex exchange after 2 months wait
How to check free disk space in Linux | Opensource.com
How does SSL actually encrypt information? - Stack Overflow
mitm vs sniffer at DuckDuckGo
Man in The Middle and other Network Attacks
Understanding Man-In-The-Middle Attacks - Part 4: SSL Hijacking
Is encryption useless against packet sniffing? - AnandTech Forums: Technology, Hardware, Software, and Deals
Hackers attack Russian bank to steal $1m using an outdated router
WIRED
https://opensource.com/article/18/7/apache-url-shortener
UK criticises security of Huawei products - BBC News
Top 10 vulnerable airports where your device can be hacked
Singapore health system hit by ‘most serious breach of personal data’ in cyberattack; PM Lee's data targeted - Channel NewsAsia
Wireshark vs Firebug vs Fiddler - pros and cons? - Stack Overflow
Is it ever possible to decrypt passively sniffed SSL/TLS traffic? - Quora
Why is it possible to sniff an HTTPS / SSL request? - Information Security Stack Exchange
TLS & Perfect Forward Secrecy | Vincent Bernat
The First Few Milliseconds of an HTTPS Connection
ImperialViolet - Forward secrecy for Google HTTPS
SSL - The Wireshark Wiki
Using Wireshark to Decode SSL/TLS Packets - Packet Pushers -
Sniffed SSL/TLS decryption : handshake necessary? - Information Security Stack Exchange
Trust FiddlerRoot Certificate
How to properly encrypt a communication channel between a client and a server (without SSL)? - Information Security Stack Exchange
How does HTTPS actually work? | Robert Heaton
How to protect your HTTPS communication from Man-In-the-Middle’s decryption in Windows Store App – Lighthouse
How does SSL/TLS work? - Information Security Stack Exchange
Schneier on Security: Applied Cryptography
Shadowsocks.com
fiddler vs mitmproxy at DuckDuckGo
What is aligned memory allocation? - Stack Overflow
How Do I Choose the Best Internet Service Provider?
Should I Ditch My ISP and Just Share My Phone's Data Connection?
Half a Billion IoT Devices Vulnerable to DNS Rebinding Attacks
Anarchy botmaster builds a botnet of 18,000 Huawei routers in a few hours
punkspider vs shodan at DuckDuckGo
Bing
Google
Seven Things You Need to Know About Qubits and How They Work
Herding Schrödinger's Cats™ -
what exactly are qubits physically at DuckDuckGo
ImponderableThings (Scott Driscoll's Blog): How Bitcoin Works Under the Hood
fiddler vs wireshark at DuckDuckGo
api vs sdk at DuckDuckGo
trusted platform module at DuckDuckGo
Whois.com - Domain Names & Identity for Everyone
is it possible to get tracked down by using public wifi at DuckDuckGo
Hack Like a Pro: How to Conduct Passive OS Fingerprinting with p0f « Null Byte :: WonderHowTo
Media & Entertainment Vulnerabilities Exploited Again
PenTest: Automation in Penetration Testing - Pentestmag
Encryption that not even a government backdoor can break – Hiding in plain sight
Brave Web Browser Implements Private Tabs That Use Tor - Deep Dot Web
How to set up a VPN on Android, Windows, Chrome OS...
Despite the security measures you've taken, hacking into your network is trivial - TechRepublic
Windows Red Team Lab
Exploit-Writeups/PS4 5.05 BPF Double Free Kernel Exploit Writeup.md at master · Cryptogenic/Exploit-Writeups · GitHub
Thought two-factor auth completely locks down Office 365? Not quite • The Register
Antivirus isn't good enough: how to stop ransomware - AndroidPIT
Smart TVs are invading privacy and should be investigated, senators say – Ars Technica
Shim (computing) - Wikipedia
Question - Quora
How to secure Google Account from SIM hijacking & intercepting Two factor SMS codes on the way & still keep it accessible? - Information Security Stack Exchange
The Most Dangerous People on the Internet in 2018: Trump, Zuck and More | WIRED
cryptography - What is the difference between a Hash Function and a Cryptographic Hash Function? - Information Security Stack Exchange
Exclusive: Ex-NSA cyberspies reveal how they helped hack foes of UAE
What is the difference between Ghidra and Ida? - Information Security Stack Exchange
What forensic analysis can be done with physical access to a machine but without the hard drive? forensics on ram after poweroff - cold boot attack - Information Security Stack Exchange
SQL injection is 17 years old. Why is it still around? - Information Security Stack Exchange
GitHub - WayzDev/Kage: Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler
How to check if a cron job ran | Benjamin Cane
Sudo: Running as a specific user - /etc/sudoers | Benjamin Cane
Sudo: List available commands | Benjamin Cane
Exploits examples - Maintaining Access - Paths in Linux - override PATH mechanism by giving absolute pathname - symbolic link attack - code injection exploits
Rise and Hack!: OS Command Injection, Path Traversal & Local File Inclusion Vulnerability - Notes
DNS Malware Analysis: Forensic Approach (W39) - eForensics
Is possible to eavesdrop on mobile data from cellphones/dongles? mobile/cellular data vs wifi security - Information Security Stack Exchange
static methods calling subtleties, calling non-static method on non-instanciated class - Quora
Beto O’Rourke’s secret membership in America’s oldest hacking group
Is it possible to "hack" a mobile phone just because it's WIFI is enabled? ssid, mitm- Information Security Stack Exchange
If I am not logged into my company's WIFI, can they view my information? Or am I transmitting? ssid, bssid - Information Security Stack Exchange
sniffing/recording GSM 3G signals - kasumi encryption - Information Security Stack Exchange
3G Femtocell at home: can anybody connect, and is all traffic encrypted? mitm rogue femtocell - Information Security Stack Exchange
Essays: Everything We Know About How the NSA Tracks People's Physical Location - Tracking Locations With Cell Towers - Schneier on Security
Can mobile phone data be intercepted or compromised? cellular data, krack, 2G vs 3G vs 4G - Information Security Stack Exchange
Hacker Spoofs Cell Phone Tower to Intercept Calls | security - WIRED
System Management BIOS - smbios - dmi - Wikipedia
Get Hardware Details In Linux With 'dmidecode' - LinuxAndUbuntu - Linux News | FOSS Reviews | Linux Tutorials HowTo
Command Injection - vs code injection - OWASP
Code Injection - vs command injection - OWASP
Path Traversal - OWASP
What's wrong with the Boeing 737 Max? Here's everything we know -Could software flaws be to blame | WIRED UK
How Safe Is Surfing on 4G vs. Wi-Fi? security - Can 4G Be Hacked?
4G vs WiFi – Which One Is Safer to Use? security - The VPN Guru
Why Your Phone’s Data Network is More Secure than Public Wi-Fi
Is-it-more-secure-to-use-my-banking-app-over-4G-instead-of-Wi-Fi
Mobile Security Showdown: Cellular Network vs. Wi-Fi - BNMC Blog | BNMC
Is Mobile Broadband More Secure than Wi-Fi? - Ask Leo!
Why you should avoid hotel Wi-Fi like the plague | TechRadar
Security risk of connecting one mobile device to another mobile device's hotspot - personal hitspot, access point name APN - Information Security Stack Exchange
Is there any security threat with open WiFi connection? wpa/wpa2 - Information Security Stack Exchange
What Are the Top 5G Security Challenges? - SDxCentral
The Promise and Peril of 5G | security - Threatpost
5G Networks Must Be Secure and Reliable - Lawfare
5G and 6G wireless technologies have security issues | Network World
How to Prepare for the Coming 5G Security Threats
5G Security: Forward Thinking Huawei White Paper
What you need to know about 5G security threats
5G Security: Analysis of Threats and Solutions
With 5G, security is top of mind from the start - Ericsson
5 key requirements for a secure 5G network - Cisco
DNS Tunneling: how DNS can be (ab)used by malicious actors
When python C extensions crash: easier debugging for your test suite
Why is Huawei's potential spying activity a big issue given that communication protocols are supposed to be secure from MITM attacks? - Information Security Stack Exchange
What theoretical risks are posed by compromised 5G infrastructure? - Information Security Stack Exchange
Addressing New Security Challenges with 5G | CSO Online
How to send files via email to VirusTotal - email attachments scanning for malware - VirusTotal
SimBad malware on Play Store infected millions of Android devices
Patched WinRAR Bug Still Under Active Attack—Thanks to No Auto-Updates
How Hackers Pulled Off a $20 Million Mexican Bank Heist | WIRED
Counter-Strike 1.6 game client 0-day exploited to spread Belonard trojan
Steam fixes 10-year-old critical remote code execution vulnerability
DNS-Shell - An Interactive Shell Over DNS Channel - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
New WordPress Flaw Lets Unauthenticated Remote Attackers Hack Sites
Why Linux System Administrators Need Programming Skills
Why It's So Hard to Restart Venezuela's Power Grid | WIRED
Understanding C++ Modules: Part 1: Hello Modules, and Module Units—Colby Pike : Standard C++
Microsoft Releases Patches for 64 Flaws — Two Under Active Attack
An introduction to psychological safety | management, leadership - Opensource.com
Most Android Antivirus Apps Are Garbage | WIRED
Audio Video Bridging - avr - Wikipedia
Implementing dm-verity  | device-mapper-verity kernel feature - Android Open Source Project
Hardware description language - Wikipedia
A Look at Python, Parameterized | Toptal
Android application fuzzing - Reverse Engineering Stack Exchange
Variable-length code - VLE - Wikipedia
What are the targets of professional reverse software engineering? purpose - real-life application - Reverse Engineering Stack Exchange
WhatsApp encryption scheme - Open Whisper Systems - signal application
Keeping Passwords Secure. -. facebook failed to hash password, kept them in clear | Facebook Newsroom
IoT Security - the DVID Challenge (W46) - Hakin9 - IT Security Magazine - Damn Vulnerable IoT Device
GitHub - ShielderSec/webtech: Identify technologies used on websites - wappalyzer alternative
GitHub - CISOfy/lynis: Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
7 Money Saving Tips for Entrepreneurs
GitHub - ElevenPaths/SDK-SMS-Stack: SDK-SMS-Stack - Framework to provided TPC/IP based characteristics to the GSM Short Message Service
XML external entity attack - XXE - Wikipedia
Where does Linux store Wifi passwords? /etc/NetworkManager/system-connections - Unix & Linux Stack Exchange
Can an open Wi-Fi hotspot be considered "secure" when using a VPN connection? public wifi security - definitive answer - Information Security Stack Exchange
Federal Emergency Management Agency FEMA leaks sensitive details of 2.3 million disaster survivors
Hackers spread password stealer malware from YouTube comment section
GitHub - 000JustMe/PewCrypt: PewCrypt Ransomware Source
How to generate a good symmetric secret key - Cryptography Stack Exchange
How does asymmetric encryption work? - Cryptography Stack Exchange
In RSA, how does the CPU deal with this huge modulus (8192 bits)? modular arithmetic, timing attack, side channels attack - Cryptography Stack Exchange
How do hashes really ensure uniqueness? hashing functions basics- Cryptography Stack Exchange
Why haven't any SHA-256 collisions been found yet? - Cryptography Stack Exchange
How does RSA signature verification work? - Cryptography Stack Exchange
How does one implement the Inverse of AES' MixColumns - Cryptography Stack Exchange
Twofish vs. Serpent vs. AES (or a combo) - Cryptography Stack Exchange
An Analyst's Review of Top Cyber Certs - Comparison CySA+, SSCP, CASP+, and CISSP. - Pentestmag
Julia: a Language for the Future of Cybersecurity - Pentestmag
Ukraine under CyberAttack - SmokeBot Loader malware - Pentestmag
Hotel Data Security — PCI Compliance and PII Security Explained - Pentestmag
Will DDOS Attack Break the Servers…? DDOS basics - Pentestmag
Five WordPress API Integration Techniques | Toptal
How are passwords stolen from companies if they only store hashes? password cracking - Information Security Stack Exchange
Timing attack - kind of side channel attack - Wikipedia
Tiny Encryption Algorithm - TEA - Wikipedia
How to Secure Your Portable Wi-Fi Hotspot
Linux Change or Rename User Name and UID (user-id) - nixCraft
How can I display the list of available WiFi networks? - Ask Ubuntu
How to "close" open ports? determine exposure, attack surface - Unix & Linux Stack Exchange
Can my employer see what I do on the internet when I am connected to the company network? employer surveillance - Information Security Stack Exchange
Should I let my child's school have access to my kid's personal laptop? school surveillance, parental control, children privacy - Information Security Stack Exchange
VDOO - Israeli Cybersecurity company
Security Advisory - Vulnerabilities Disclosure - Hikvision IP Cameras Manufacturer
Establishing Cybersecurity Assurance System for Video Surveillance Products-Hikvision
About “Port Forwarding” security considerations -Hikvision
HikCentral V1.1.x for Windows Servers Hardening Guide-Hikvision
IP/Network Camera Security Guide-Hikvision
Network Video Recorder NVR Security Guide-Hikvision
Year 2000 problem - Y2K problem, the Millennium bug, the Y2K bug - Wikipedia
NoDistribute - Online Virus Scanner Without Result Distribution. - virustotal like service without sharing results
How to bypass tcpwrapped with nmap scan - Information Security Stack Exchange
Is "Have I Been Pwned's" Pwned Passwords List really that useful? - Information Security Stack Exchange
Is there any particular reason to use Diffie-Hellman over RSA for key exchange? - Information Security Stack Exchange
How well-protected am I behind Tor? - Tor Stack Exchange
Why can't Tor Browser use Adobe Flash Player? - Tor Stack Exchange
Getting the s-box input from its output in differential cryptanalysis on DES - Cryptography Stack Exchange
Facebook's cryptocurrency could be $19B revenue opportunity: Barclays
WhatsApp Cofounder Brian Acton Explains Why He Felt He Had To Sell To Facebook
Trapdoor commitments in the SwissPost e-voting shuffle proof. - SwissPost-Scytl mixnet e-voting system - voting machines
Study of the Belonard Trojan, exploiting zero-day vulnerabilities in Counter-Strike 1.6
Attackers Exploiting WinRAR UNACEV2.DLL Vulnerability (CVE-2018-20250) | McAfee Blogs
10 Essential Vue.js Interview Questions and Answers
NSA OSS Technologies
nsacyber · GitHub. - NSA Open Source Cybersecurity Project
What's the difference between open source software and free software? | Open source is a development methodology; free software is a social movement. - Opensource.com
NationalSecurityAgency · GitHub
Life-Critical Systems: How to Update and Maintain Them | Toptal
Speculative Load Hazards Boost Rowhammer and Cache Attacks
Ghidra
Resecurity | Supply Chain – Iridium Iranian Group - Citrix Data Theft - The Major Target of Cyberespionage Groups
MOBISEC - Mobile Security - Definitive academic course
GitHub - trustedsec/unicorn: Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedS…
GitHub - govolution/avet: AntiVirus Evasion Tool
peCloak.py - An Experiment in AntiVirus Evasion - Security SiftSecurity Sift
Bypass Antivirus Dynamic Analysis - wikileaks
Antivirus Evasion for Penetration Testing Engagements | AT&T Cybersecurity
What is the meaning of movabs in gas/x86 AT&T syntax? - Reverse Engineering Stack Exchange
Set a breakpoint on GDB entry point for stripped PIE binaries without disabling ASLR - Reverse Engineering Stack Exchange
What does mov qword ptr ds:[rax+18], r8 mean? segment register, memory segmentation - Reverse Engineering Stack Exchange
AI: A new route for cyber-attacks or a way to prevent them? artificial intelligence hacking techniques
FEMA Leaked Data From 2.3 Million Disaster Survivors | WIRED
how to automate google search on a predefined set of sites - Google Search
6 Money-Saving Tips For Entrepreneurs
Medtronic defibrillators vulnerable to life threatening cyber attacks
Medtronic's Implantable Defibrillators Vulnerable to Life-Threatening Hacks
12 open source tools for natural language processing | Opensource.com
Facebook stored 600m user passwords in plain text exposed to 20k employees
Your Facebook Password Isn’t Safe. Neither Is Your Android Phone | WIRED
Macro Evil in C++ Code—Andrey Karpov : Standard C++
Facebook Stored Millions of Passwords in Plaintext—Change Yours Now | WIRED
Flaw in NSA’s GHIDRA leads to remote code execution attacks
Facebook Mistakenly Stored Millions of Users' Passwords in Plaintext
Why is it impossible to produce truly random numbers? srand(time(NULL) - Software Engineering Stack Exchange
Random Number Generation: Types and Techniques
Randomness - Wikipedia
Why do we need a seed in Random Number Generators? - Software Engineering Stack Exchange
MIT School of Engineering | » Can a computer generate a truly random number? PRNG
Why do we need "perfectly" random numbers? seed - Mathematics Stack Exchange
Why Random Numbers are Impossible in Software | Aaron Krauss
Question - Quora
random.seed(): What does it do? - Stack Overflow
What is a seed in terms of generating a random number? - Stack Overflow
What exactly is a seed in a random number generator? - Cross Validated
Random seed - Wikipedia
Why secure systems require random numbers - NSA weakening random number generator -
How Computers Generate Random Numbers - cryptography related
Random number generation - RNG, PRNG, HRNG/TRNG, CSPRNG - backdoor
What is the use of REAL random number generators in cryptography? - Cryptography Stack Exchange
What does 'seeding' mean? random number generation - Stack Overflow
Hardware random number generator - Wikipedia
Certifiable quantum dice - random number generation
DEFINITIVE - Programming a quantum computer: generating true random numbers - Introduction - RNG vs PRNG - superposition - IBM Qiskit SDK
Quantum Advantage Now: Generation of True Random Numbers
Certified True Randomness Created by Cambridge Quantum Computing
Quantum Mechanics Creates a Totally Random Number Generator | WIRED
NIST’s New Quantum Method Generates Really Random Numbers | NIST
Can a quantum computer generate a truly random number - starting seed, pseudo-random -.hardware RNG built in that can generate true random numbers for encryption purposes.
First Evidence That Quantum Processes Generate Truly Random Numbers - MIT Technology Review
YubiHSM - Hardware Security Module HSM for your Server |. hardware security module providing root of trust for servers and computing devices - Yubico
Noise (electronics) - Wikipedia
Ivy Bridge (microarchitecture) - the Intel Core processors (Core i7, i5, i3) - Wikipedia
Behind Intel’s New hardware Random-Number Generator - IEEE Spectrum
Connecting to wifi network through command line - Unix & Linux Stack Exchange
How to connect to WiFi from the command line? - Ask Ubuntu
Hostapd : The Linux Way to create Virtual Wifi Access Point | hotspot config from linux command line - Foo, Bar and Foobar
Using command line to connect to a wireless network with an http login - lynx vs links command line browsers - Super User
How to Secure Your Android Phone with a PIN, Password, or Pattern
Sensor data can be used to guess your PIN, unlock your phone – Naked Security
10 top tips for smartphone security | Digital Unite
How Safe is Your Android Pin Code? A New Robot Can Easily Break In | McAfee Blogs
Does Username + Password + Pin improve login security? - Information Security Stack Exchange
Biometrics for screen locks vs encryption - Information Security Stack Exchange
Password strength and banks 4 pin code? - Information Security Stack Exchange
Unix User Enumeration | manually discover usernames based on the services that are running. - Penetration Testing Lab
DEFINITIVE - What is Enumeration? NetBios Enumeration,SNMP Enumeration,LDAP Enumeration,NTP Enumeration,SMTP Enumeration,DNS Enumeration,Windows Enumeration, UNIX /Linux Enumeration
SCADA Hacking: Finding SCADA Systems using Shodan
What can hackers do with ability to read /etc/passwd? - Information Security Stack Exchange
Hack Like a Pro: Finding Potential SUID/SGID Vulnerabilities on Linux & Unix Systems - setuid exploitation « Null Byte :: WonderHowTo
How many Remote Users? - Unix & Linux Stack Exchange
SSH Tricks | Servers for Hackers
6 Ways to Hack SSH Login Password
History of IP addresses that accesed a server via ssh - Unix & Linux Stack Exchange
Get SSH username & Password For Any Server easily with Brute Force Attack – bug bounty hunting
Scanner SSH Auxiliary Modules - Metasploit Unleashed
How to disable ssh password login on Linux to increase security - nixCraft
A Guide to Undefined Behavior in C & C++ - cpp
With Undefined Behavior, Anything is Possible | Raph Levien’s blog
An Introduction to Use After Free Vulnerabilities | Use After Free (UAF) vulnerabilities are a class of memory corruption bug - security - Pure Hacking
Doubly freeing memory vulnerability - Doubly freeing memory may result in a write-what-where condition, allowing an attacker to execute arbitrary code, exploited by heap/stack overflow attacks -OWASP
CWE - CWE-125: Out-of-bounds Read (3.2). - related to buffer overflow attack
CppCon 2017: John Regehr “Undefined Behavior in 2017 (part 2 of 2)” - c c++- YouTube
A Differential Approach to Undefined Behavior Detection. - Risks | March 2016 | Communications of the ACM
Max value of INT in 64 bit computer - Stack Overflow
synology nas at DuckDuckGo
Zeroshell - Wikipedia
Detecting protected processes and critical processes from windows driver - Critical System Service - Reverse Engineering Stack Exchange
What does cherry-picking a commit with Git mean? - Stack Overflow
Understanding Git Cherry-pick: How to Use | Codementor
Git - git-cherry-pick Documentation
Git: how to reverse-merge a commit? - Stack Overflow
C Is Not a Low-level Language - ACM Queue
Pointers Are Complicated, or: What's in a Byte?
What symbol tables stay after a strip In ELF format? - Reverse Engineering Stack Exchange
Why does AES have exactly 10 rounds for a 128-bit key, 12 for 192 bits and 14 for a 256-bit key size? mathematical foundations - Cryptography Stack Exchange
Is it possible to build a CPA-secure encryption scheme which remains secure even when the encryption of secret key is given? - Cryptography Stack Exchange
What does this paraphrase of the birthday problem mean? - Cryptography Stack Exchange
How to verify if g is a generator for p? - Cryptography Stack Exchange
When was hash chain first used? hashing function history - Cryptography Stack Exchange
Why does the Signal protocol use AES/CBC instead of AES/GCM? - Cryptography Stack Exchange
Hardness of. The Learning Parity with Noise LPN problem with small secret - Cryptography Stack Exchange
Should we trust the NIST-recommended elliptic curve cryptography ECC parameters? NSA Security Protocol Weakening Attempts - Cryptography Stack Exchange
What is the "shared secret" used for in IPSec VPN? - Cryptography Stack Exchange
How can I use SSL/TLS with Perfect Forward Secrecy? - Cryptography Stack Exchange
Forward anonymity - Wikipedia
Another New AES Attack - use AES-128 over AES-256 - Schneier on Security
What are the differences between a digital signature, a MAC and a hash? - Cryptography Stack Exchange
Signed versus unsigned integers « Stack Overflow
Why computers represent signed integers using two’s complement - Modern processors and two’s complement
A tutorial on signed and unsigned integers « Stack Overflow
A Battle Against Android Malware - Hakin9 - IT Security Magazine
GitHub - Azure/CloudIoTHack: An end-to-end IoT Solution Workshop - Microsoft Azure
Webhooks | GitHub Developer Guide
Manage security alerts in Azure Security Center | Microsoft Docs
Microsoft Windows NBT/SMB Mailslot Remote Code Execution Vulnerability
Initial public offering - IPO - Wikipedia
Programmers Who Don't Understand Security Are Poor at Security - Secure Coding, crypto libraries - Schneier on Security
Huawei's Problem Isn't Chinese Backdoors. It's Buggy Software - vulnerabilities | WIRED
How Microsoft found a Huawei driver that opened systems to attack - vulnerabilities | Ars Technica
Tor Project: Android Instructions - guardian project's orbot
Secure my connection with VPN router & Tor - definitive answers - Tor Stack Exchange
Jared Kushner and Ivanka Trump Use Private Accounts for Official Business, Their Lawyer Says - The New York Times
Firefox, Edge, Safari, Tesla & VMware pwned at Pwn2Own
Pakistani Govt’s passport application tracking site hacked with Scanbox framework
WordPress Maintenance Tips and Tricks | Toptal
Il est effrayant de voir la quantité de données personnelles laissées par les utilisateurs sur les ordinateurs et téléphones usagés, rapporte Rapid7 - secure deletion/erasure
Restict Internet Connection Except using Proxy - Server Fault
How To Use Proxy On Linux Command Line? - LinuxAndUbuntu - Linux News | FOSS Reviews | Linux Tutorials HowTo
How to configure for an Authenticating Proxy Server - Unix & Linux Stack Exchange
How To Use Proxy Server To Access Internet at Shell Prompt With http_proxy Variable - nixCraft
How to Hack Android Devices Using the StageFright Vulnerability [Updated 2019]
How to Hack Android Devices Using the Stage Fright Vulnerability
Stagefright: It Only Takes One Text To Hack 950 Million Android Phones
How to Hack Millions of Android Phones Using Stagefright Bug, Without Sending MMS
Stagefright (bug) - Wikipedia
Local Network Attacks: LLMNR and NBT-NS Poisoning - Stern Security
GitHub - maaaaz/androwarn: Yet another static code analyzer for malicious Android applications
GitHub - wpscanteam/wpscan: WPScan is a free, for non-commercial use, black box WordPress vulnerability scanner written for security professionals and blog maintainers to test the security of their sites.
GitHub - joda32/got-responded: A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)
GitHub - gildasio/h2t: h2t (HTTP Hardening Tool) scans a website and suggests security headers to apply
New Settings Let Hackers Easily Pentest Facebook, Instagram Mobile Apps - bypass Certificate Pinning
How Zello Became a Lifeline for Venezuelans Under Maduro | WIRED
Mastercard Wades Into Murky Waters With Its New Digital ID | WIRED
GitHub - endgameinc/xori: Xori is an automation-ready disassembly and static analysis library for PE32, 32+ and shellcode
Insecure UC Browser 'Feature' Lets Hackers Hijack Android Phones Remotely
ShadowHammer: ASUS software updates exploited to distribute malware
GitHub - leoloobeek/LAPSToolkit: Tool to audit and attack LAPS environments
GitHub - alphasoc/flightsim: A security utility to generate malicious network traffic and evaluate controls -The tool performs tests to simulate DNS tunneling, DGA traffic, requests to known active C2 destinations, and other suspicious traffic patterns.
Privacy in 2019: 6 Basic Steps to Keep Yourself Protected - definitive
Elfin Hacking Group Targets Multiple U.S. and Saudi Arabian Firms - Iran-linked cyber-espionage group, APT33
Continuous response: The essential process we're ignoring in DevOps | Opensource.com
Advanced Breach Protection Demystified – Untold Truths On Security Beyond AV
HTTPS Isn't Always As Secure As It Seems | risks - WIRED
Ex-NSA Contractor Pleads Guilty to 20-Year-Long Theft of Classified Data
ShadowReader: Serverless load tests for replaying production traffic | Opensource.com
9 open source tools for building a fault-tolerant system | Opensource.com
GitHub - SecureThisShit/WinPwn: Automation for internal Windows Penetrationtest / ActiveDirectory-Security - Still much work to do
Here's the List of ~600 MAC Addresses Targeted in Recent ASUS Hack
How to Find Out Who is Using a File in Linux
Commando VM — Turn Your Windows Computer Into A Hacking Machine
Microsoft seizes 99 websites used by Iranian hackers for phishing attacks - charming kitten, apt35
Unpatched Zero-Days in Microsoft Edge and IE Browsers Disclosed Publicly - universal cross-site scripting (UXSS), SOP (Same Origin Policy)
Hackers Steal $19 Million From Bithumb Cryptocurrency Exchange
Reverse Engineering C++ - CppCast
0xgalz - C++ Reverse Engineering Tools · GitHub
Warning: ASUS Software Update Server Hacked to Distribute Malware
When Virtual Hell Freezes Over - Reversing C++ Code
Wanna Play a Detective? Find the Bug in a Function from Midnight Commander - c++ code analysis debugging
GitHub - hanickadot/compile-time-regular-expressions: A Compile time PCRE (almost) compatible regular expression matcher.
Exfiltrating Remaining Private Information from Donated Devices - data remanence, data recovery, data secure deletion/erasure, definitive guide
GitHub - FortyNorthSecurity/Just-Metadata: Just-Metadata is a tool that gathers and analyzes metadata about IP addresses. It attempts to find relationships between systems within a large dataset. - You can search all IPs to find which ones are used in callbacks as identified by VirusTotal. Want to see if any IPs loaded have been documented as taking part of attacks via the Animus Project, Just-Metadata can do it.
How to use bridges in Orbot? - Tor Stack Exchange
Orbot: Tor for Android – Guardian Project
No more “Root” features in Orbot… use Orfox & VPN instead! – Guardian Project
How does Tor obfs4 protocol and PTs work? - Tor Stack Exchange
Tor Project: Bridges
Tor Project: Pluggable Transports
Password resets - what practices should web services follow? - Information Security Stack Exchange
Do security questions subvert passwords? security secret question risks, should not be used alone and best practice should favor more reliable alternatives - Information Security Stack Exchange
Is storing answers to security questions in plain text bad form? - Information Security Stack Exchange
Is it bad practice to use the same password for multiple accounts on the same website? - Information Security Stack Exchange
Why are data breaches like the one at Quora considered so bad? account breaches/data theft consequences on privacy - Information Security Stack Exchange
Should security question answers be case-sensitive? secret security question weaknesses - Information Security Stack Exchange
Which is more secure for a reset password feature - security questions or reset link in email? - Information Security Stack Exchange
Most Secure Programming Languages - Most Frequent Security Vulnerabilities for Different Languages
Majority of bitcoin trading is a hoax, new study finds
Secrets, Lies, and Account Recovery: Lessons from the Use of Personal Knowledge Questions at Google – secret security questions analysis - Google AI
Sending password reset links in email - Information Security Stack Exchange
Former NSA spies hacked BBC host, Al Jazeera chairman for UAE - Project Raven cyberspies group, Karma exploit targetting iPhones
'Karma': Inside the hack used by the UAE to break into iPhones of foes - karma exploit iphones
E Hacking News - Latest Hacker News and IT Security News: Karma, a iPhone spy tool by UAE government
UAE's 'Karma' hack tool spied on iPhones just by sending a text, report says - CNET
UAE used 'Karma' hack tool to spy on iPhone photos, texts, and more - karma exploit
Question - Quora
Report: iPhone hacked by 'Karma' attack just by receiving a text via iMessage - CSO | The Resource for Data Security Executives
Hackers used Karma tool to hack iPhones of prominent Govt officials
iPhone spy tool allowed UAE govt to view photos, emails, more - 9to5Mac
Secret UAE Spy Team Used “Cyber Super-Weapon” to Hack Any iPhone - Karma exploit, Project Raven
Is there a good way to store credentials outside of a password manager? secure password/credentials storage - Information Security Stack Exchange
Why use random value when overwriting files? définitive answer, cryptoshredding private key storage on flahs memory - Information Security Stack Exchange
How to Securely Delete the Trash (Recycle Bin) in Windows
How does a 7- or 35-pass erase work? Why would one use these methods? Gutmann method - Stack Overflow
How can I rename an unix user? - Server Fault
Virtually A Machine: Howto: disable eCryptFS
Why is a secure erase 'not necessary' for SSD's? - data recovery/remanence, secure erasure
Will microwaving a flash drive destroy the data on it? - Super User
Data Removal Processes for a Solid State Hard Drive | secure deletion/erasure - self-encrypting hard drive (SED) - Dell France
What Is the Random Data Method? secure deletion
What Is ATA's Secure Erase feature and How Does It Wipe a Drive?
Why erase file with random patterns instead of all 0's or 1's? secure deletion - Super User
Is it possible to recover data on a zeroed hard drive? secure deletion - residual magnetism - Skeptics Stack Exchange
What is the recommended way to empty a SSD? secure deletion - ATA Secure Erase - Ask Ubuntu
ATA Secure Erase - secure deletion - hdparm
WordPress Roots Stack Explained | Toptal
How can I use plugins in TorBrowser? adobe flash security risks - Tor Stack Exchange
Why do the price of bitcoins vary wildly between exchanges? Cryptocurrency economics - Bitcoin Stack Exchange
Updating Adobe Flash Player to Tor Browser - Tor Stack Exchange
Schneier on Security: Academic - Cryptography primitives and protocols
How to create a filesystem on a Linux partition or logical volume - /etc/fstab, blkid, mkfs, df commands | Opensource.com
Toyota data breach: Hackers steal 3.1 million customers' data
How to Respond to a Cyber Attack on Your Business
How Endpoint Management Can Keep Workplace IT Secure
How dangerous is XSS? - Information Security Stack Exchange
Is it bad practice to use your real name online? physical security, identify theft, anonymity - Information Security Stack Exchange
21 things you can do with XSS – xss risks and consequences - Somdev Sangwan
Mass Cracking Cybrary Accounts – Somdev Sangwan
How does hashing work? cryptographic hash function - mathematic foundations - Information Security Stack Exchange
How can I enumerate and hook into a Windows 10 RPC interface? RPC hacking - Reverse Engineering Stack Exchange
Does windows 10 compromise TOR? Windows security flaws, concerns - Tor Stack Exchange
Unpatched Flaw in Xiaomi's Built-in Browser App Lets Hackers Spoof URLs
OSCP Review - Cracking OSCP at 17 - Andmp - definitive guide on training methodology for OSCP Certification | A blog about infosec, bug hunting and more!
Andmp | A blog about infosec, bug hunting and more! hacking general resources
Mar-a-Lago's Security Problems Go Way Beyond a Thumb Drive - cyberattacks, Trump | WIRED
3 Easy Ways to Detect Hidden Cameras and Microphones - wikiHow
How to Detect Hidden Surveillance Cameras at Home With Your Phone
Difference Between CCTV and Security Camera - Difference Between
How to Detect Hidden Cameras — Top 6 Ways (with Step-by-Step Guide & Videos) — Reolink Blog
The Secrets to Finding Hidden Cameras - Techlicious
How to Hack CCTV Private Cameras « Null Byte :: WonderHowTo
Watch how to hack a security camera. It’s alarmingly simple
Closed-circuit television camera - Wikipedia
IP camera - Wikipedia
GitHub - JPaulMora/Pyrit: The famous WPA precomputed cracker. Pyrit allows you to create massive databases of pre-computed WPA/WPA2-PSK authentication phase in a space-time-tradeoff. Definitive wifi hacking tool
How is the memory inside card chips read without a power source? card chipspower supply - Super User
Smart Cards How it Works? schematics
EverCrypt: A Verified Crypto Provider Engineered for Agile, Multi-Platform Performance - cryptographic primitives implementation
How the EverCrypt Library Creates Hacker-Proof Cryptography | unhackable
Formal Verification Creates Hacker-Proof Code | Quanta Magazine
Unhackable Cryptography? EverCrypt library criticism - Schneier on Security
Facebook Let Dozens of Cybercrime Groups Operate in Plain Sight | WIRED
New malware can modify CT and MRI scan results - israeli malware - medical imaging equipment
Top 10 VPN Services For 2019
GitHub - mattifestation/PowerShellArsenal: A PowerShell Module Dedicated to Reverse Engineering
Hard Times for Cryptojacking
Hackers Could Turn Pre-Installed Antivirus App on Xiaomi Phones Into Malware
Small stickers on the ground trick Tesla autopilot into steering into opposing traffic lane / Boing Boing - Pwning Artificial intelligence
Adversarial Machine Learning against Tesla's Autopilot - Pwning Artificial intelligence - Schneier on Security
It’s Time to End the NSA’s Metadata Collection Program | WIRED
Trump's North Korea Talks at Mar-a-Lago Should Have Been More Secure | WIRED
Federal probe focuses on Mar-a-Lago intruder, Cindy Yang | Miami Herald
GitHub - Viralmaniar/I-See-You: ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will… - geolocation, physical privacy
540 Million Facebook User Records Found On Unprotected Amazon Servers
10 Best File and Disk Encryption Tools for Linux - tomb, luks, cryfs, cryptsetup, cryptmount, encfs, veracrypt, 7zip, dmcrypt, ecryptfs
In-Depth Analysis of JS Sniffers Uncovers New Families of Credit Card-Skimming Code - card payment security, e-commerce sites hacking
5 useful open source log analysis tools - nagios, garylog, elk | Opensource.com
New Apache Web Server Bug Threatens Security of Shared Web Hosts
Facebook Caught Asking Some Users Passwords for Their Email Accounts
Your next Game of Thrones download can be a malware - Here's why - malware spreading/distribution
Tesla autopilot feature hacked to risk oncoming traffic - pwning artificial intelligence
Is Flawless Anonymity Possible? definitive guide anonymity throughout cyberattack
GitHub - bitbrute/evillimiter: Tool that limits bandwidth of devices on the same network without access.
How I Eat For Free in NYC Using Python, Automation, Artificial Intelligence, and Instagram
Essays: How the NSA Threatens National Security - Schneier on Security
Essays: Securing Medical Research: A Cybersecurity Point of View - health infrastructure security - Schneier on Security
Essays: Our Security Models Will Never Work—No Matter What We Do - rethinking security - Schneier on Security
Essays: Could Your Plane Be Hacked? airplanes hacking - Schneier on Security
Essays: Who Is Publishing NSA and CIA Secrets, and Why? - Schneier on Security
Essays: The Government Must Show Us the Evidence That North Korea Attacked Sony - Schneier on Security
Essays: Someone Is Learning How to Take Down the Internet - ddos - Schneier on Security
Essays: Hacker or Spy? In Today's Cyberattacks, Finding the Culprit Is a Troubling Puzzle - Sony hack 2014 - Schneier on Security
MoA - Obama Gambled, Lost U.S. Credibility On Cyber Claims - sony hack 2014
The Consequences of Credible Doubt About the USG Attribution in the Sony Hack - Lawfare
Best VPN Services Reviewed for 2019 - Read my UNBIASED Reviews - VPN comparison guide
Bloggers Guide to WordPress Security | BestVPN.org
Tor Proxy Used By Cybercriminals To Initiate Bitcoin Theft
'Exodus' Spyware Posed as a Legit iOS App - iOS malicious malware app | WIRED
How Android Fought the Chamois Botnet—and Won - ddos | WIRED
The Shape of Code » Verified compilers and soap powder advertising - hacker proof code
The Truth About VPN Logs. Should You Care? - TORRENT VPN GUIDE
These Torrent-Friendly VPNs Keep No Logs Whatsoever - TORRENT VPN GUIDE
Essays: Terrorists May Use Google Earth, But Fear Is No Reason to Ban It - cyberattacks - Schneier on Security
Essays: There's No Good Reason to Trust Blockchain Technology - definitive criticism against cryptocurrency and blockchains - Schneier on Security
Essays: Machine Learning Will Transform How We Detect Software Vulnerabilities - artificial intelligence tools - Schneier on Security
Essays: We Still Don't Know Who Hacked Sony - Schneier on Security
Essays: Did North Korea Really Attack Sony? - Schneier on Security
Essays: The Best Thing We Can Do About the Sony Hack Is Calm Down - Schneier on Security
Essays: Book Review: Cyber War Will Not Take Place - Schneier on Security
Essays: Syrian Electronic Army: A Brief Look at What Businesses Need to Know - Schneier on Security
Essays: Has U.S. Started an Internet War? - Schneier on Security
Essays: Rhetoric of Cyber War Breeds Fear—and More Cyber War - Schneier on Security
Essays: Militarizing Cyberspace Will Do More Harm Than Good - cyberwar - Schneier on Security
Essays: Debate Club: An International Cyberwar Treaty Is the Only Way to Stem the Threat - Schneier on Security
Essays: It Will Soon Be Too Late to Stop the Cyberwars - Schneier on Security
Essays: 3 Reasons to Kill the Internet Kill Switch Idea - Schneier on Security
CCTV vs. IP Cameras-Security Cameras
CCTV vs. Security Systems: What's the Difference?
Essays: Threat of "Cyberwar" Has Been Hugely Hyped - Schneier on Security
Email Account under attack (really) - anything I can do? - Information Security Stack Exchange
Alternative to sending password over mail? mail encryption, priavte/anonymous mail provider, password managers - Information Security Stack Exchange
What exploit are these user agents trying to use? php command injection - Information Security Stack Exchange
How can I make payments on the Internet without leaving a money trail? money trail, anonymous private payment, vpn purchase- Information Security Stack Exchange
How is it possible for user's password to be changed after storage was encrypted? (on OS X, Android) - low-level android encyption details, argon, key derivation function - Information Security Stack Exchange
If I know the CPU architecture of a target, can I send instructions embedded in an image? malware embedded in image - Information Security Stack Exchange
Where do you store your personal private GPG key? key storage - Information Security Stack Exchange
How difficult to crack keepass master password? brute force attack time length - Information Security Stack Exchange
KeePass Password Safe - foss password manager
How to Hack KeePass Passwords using Hashcat
10 Essential Full-stack Interview Questions and Answers
Flutter Tutorial: How to Build a Messaging App | Toptal
AES: Why is it a good practice to use only the first 16 bytes of a hash for encryption? - Cryptography Stack Exchange
About integer factorization - Cryptography Stack Exchange
How to get a speedup linear in the number of iterations on unsalted iterated password hashing? hashing password, salt, rounds, - Cryptography Stack Exchange
Zero-knowledge proof with only a ciphertext - Cryptography Stack Exchange
Best way to reduce chance of hash collisions: Multiple hashes, or larger hash? - Cryptography Stack Exchange
Why use an Initialization Vector (IV)? - Cryptography Stack Exchange
Can you recover the password from ZipCrypto encrypted ZIP file? - Information Security Stack Exchange
How does one attack a two-time pad (i.e. one time pad with key reuse)? - Cryptography Stack Exchange
Creating your own encryption and decryption algorithm - Cryptography Stack Exchange
Should we sign-then-encrypt, or encrypt-then-sign? encryption, digital signature - Cryptography Stack Exchange
3.2.0.3? · Issue #1195 · twbs/bootstrap-sass backdoored, malware distribution/spreading · GitHub
Official PCI Security Standards Council Site - Verify PCI Compliance, Download Data Security and Credit Card Security Standards
Is your eCommerce Website PCI Compliant? | Pronko Consulting
Question - Quora
GitHub - KINGSABRI/godofwar: GodOfWar - Malicious Java WAR builder with built-in payloads
New Version of Flame Malware Discovered - Schneier on Security - stuxnet related, israeli/NSA cyberwarefare
GitHub - s0md3v/XSStrike: Most advanced XSS scanner.
Breaking Down the Julian Assange Hacking Case | WIRED
How To Make Your Amazon Echo and Google Home as Private as Possible | WIRED
Wikileaks founder Julian Assange arrested in London
TajMahal Spyware - APT malware, nation-state. agency - Schneier on Security
Do any non-US ciphers exist? iran,china,russia, corea encryption cypher - Cryptography Stack Exchange
Why most people use 256 bit encryption instead of 128 bit? AES 128 vs 192 vs 256 - Information Security Stack Exchange
Snake Oil Security - Recognizing Bad Crypotgraphy. - definitive guide - Schneier on Security
Printed circuit board - PCB - Wikipedia
WiFi Hotspot Security? MAC address filter android wireless hotspot - Android Enthusiasts Stack Exchange
GPU-Based Password Cracking: AMD Vs. Nvidia In Brute-Force Attack Performance - Wi-Fi Security: Cracking WPA With CPUs, GPUs, And The Cloud
Key strength/length in symmetric cryptography - Bad Cryptography of Crypteto - Schneier on Security
Secure Passwords Keep You Safer - password length - Schneier on Security
Encryption Algorithms, Key Sizes and Parameters Report 2013 recommendations/activities/identity-and-trust/library/deliverables/algorithms-key-sizes-and-parameters-report/at_download/fullReport
Why not use larger cipher keys? asymmetric key length - Information Security Stack Exchange
How to Perform a Man in the Middle (MITM) Attack with Kali Linux by Jaken Herman - Hakin9 - IT Security Magazine
Hacking Cryptocurrency Miners with OSINT Techniques by Seyfullah KILIÇ - Hakin9 - IT Security Magazine
How to run your own OpenVPN server on a Raspberry Pi by Denis Nuțiu - Hakin9 - IT Security Magazine
Five Pentesting Tools and Techniques (That Every Sysadmin Should Know). -. Responder, LLMNR, NBT-NS, WPAD - Powershell Empire, C2 Server - Hashcat GPU-based hash cracking - OWASP, SDLC - Arpspoof and Wireshark - Subdomain enumerators - definitive guide - by Jeremy Trinka - Hakin9 - IT Security Magazine
Script Kiddie Nightmare: IoT Attack Code Embedded with Botnet Backdoor by Ankit Anubhav - Hakin9 - IT Security Magazine
What are the chances that AES-256 encryption is cracked? strength, threat model - Cryptography Stack Exchange
Differences between industrial and military cryptography - Cryptography Stack Exchange
Is it legal for a website like booking.com to store the credit card information of guests on their servers, and make that information available to hotels? Payment Card Infos Secure Storage
GitHub - yampelo/beagle: Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs - Logs Visualization
Getting started with Python's cryptography library | Opensource.com
Bash vs. Python: Which language should you use? | Opensource.com
GitHub - dark-lbp/isf: ISF(Industrial Control System Exploitation Framework),a exploitation framework based on Python
Mysterious Hackers Hid Their Swiss Army Spyware for 5 Years - APT Malware TajMahal | WIRED
Encrypted Messaging Project "Matrix" Suffers Extensive Cyber Attack
The Day I Fell in Love with Fuzzing « null program
Maliciously Tampering with Medical Imagery -. cybersecurity israeli researchers- Schneier on Security
Popular Video Editing Software Website Hacked to Spread Banking Trojan - Malware spreading/distribution
How to Calculate IP Subnet Address with ipcalc Tool
WikiLeaks Founder Julian Assange Arrested After Ecuador Withdraws Asylum
Be your own certificate authority | Opensource.com
Security Flaws in WPA3 Protocol Let Attackers Hack WiFi Password
How the Anonymous Artist Banksy Authenticates His or Her Work - Schneier on Security
Best IP Address Management Tools for Linux
GitHub - hc0d3r/mysql-magic: dump mysql client password from memory
A Peek Into the Toolkit of the Dangerous 'Triton' Hackers | WIRED
How we built a Linux desktop app with Electron | Opensource.com
A New Breed of ATM Hackers Gets in Through a Bank’s Network - ATM Banking Hackers | WIRED
Sophisticated 'TajMahal APT Framework' Remained Undetected for 5 Years
Nasty Android & iOS malware found using govt surveillance tech
GitHub - rek7/mXtract: mXtract - Offensive Memory Extractor & Analyzer
NoScript extension officially released for Google Chrome | ZDNet
Yahoo strikes $117.5 million data breach settlement after earlier accord rejected - Reuters
Yahoo's 2013 Email Hack Actually Compromised Three Billion Accounts | WIRED
Hey Secret Service: Don't Plug Suspect USB Sticks into Random Computers - zhang hacking attemptbTrump residency - Schneier on Security
Microsoft Releases April 2019 Security Updates — Two Flaws Under Active Attack
Researcher Reveals Multiple Flaws in Verizon Fios Routers — PoC Released
What it takes to become a blockchain developer | Opensource.com
'Exodus' Surveillance Malware Found Targeting Apple iOS Users
Hackers claims to steal 6 million Israeli voters data
Samsung Galaxy S10’ biometric sensor hackable with copy of owner’s fingerprint
Ghidra: NSA's Reverse-Engineering Tool - vs IDA - Schneier on Security
A Ransomware Outbreak Is Infecting Computers Across the World Right Now - NotPetya - Motherboard
Don't Draw the Wrong Conclusions from the WannaCry Ransomware Outbreak - Motherboard
Releasing the NSA’s Previously Classified Tool ‘Ghidra’ For Free Is a ‘Game Changer’ - Motherboard
Windows 10, version 1809: Change in default removal policy for external media
Malicious remote code execution backdoor discovered in the popular bootstrap-sass Ruby gem | Snyk
Question - Quora
The myth of military grade encryption – Jack Poon – Medium
What is a basic outline of "military-grade" encryption? - crypto
You're Probably Doing 2FA Wrong: Here's the Right Way - Safest 2FA of all
Scan Networks for Vulnerabilities With Nmap | ExplainHowNow
Multiple Enterprise VPN Apps Allow Attackers to Bypass Authentication
10 Things You Need to Do After Being Hacked - Fighting off Botnet
Leap Visitor Card - Leap Card
12 Perfect Moments in Ireland
Visa Inc. - card payment system - Wikipedia
Mastercard - card payment system - Wikipedia
Where to Exchange Currency Without Paying Huge Fees - financials, trips - NerdWallet
How to Choose an International Bank – Offshore Asset Protection - financials
Banking: How To Choose A Bank - financials
How to Choose an International Bank - financials | Caye International Bank
The Best Bank For You - International Banks - financials
5 Of The Best Business Checking Accounts For Entrepreneurs - financials | Money Under 30
How to Delete Your Usage History Tracks in Windows (with Pictures) - privacy in public computers
How To Safely Delete Temporary Files In Windows 10 - %temp% directory - privacy in public computer
How to Delete Temporary Files in Windows - %temp% directory - privacy in public computers
How to Choose a Bank for Your Small Business - for tech-oriented businesses and entrepreneurs - financials
Reasons to Bank Internationally - financials | HowStuffWorks
meilleures banques en lignes pour micro-entrepreneur at DuckDuckGo - financials
10 Success Tips for New Solopreneurs & Independent Entrepreneurs
6 Essential WordPress Plugins for Solopreneurs - free live chat, marketing, broken link detector — SitePoint
Capital One BrandVoice: 5 Family-Friendly Spring Camping Adventures Worth Traveling For
What Are Online Banks? The Pros and Cons
Online banking - Wikipedia
What Is Online Banking? Know The Pros And Cons | Bankrate.com
Online Banking Definition
Best Online Banks In The US For 2019 | Bankrate.com
The Pros and Cons of Online Banking
Boot and run Linux from a USB flash memory stick - privacy in public computers | USB Pen Drive Linux
How can I avoid my password being harvested by key loggers from internet cafes? privacy in public computers, - Information Security Stack Exchange
Are "data races" and "race condition" actually the same thing in context of concurrent programming - Stack Overflow
How to Safely Use Internet Cafes and Wifi Hotspots Abroad - public computers privacy
How to Preserve Your Privacy in an Internet Cafe: 10 Steps - public computer privacy
Using Internet Cafes as securely as possible - public computers privacy
5 Safety Tips when Using a Public Computer - public computers privacy
What the US military has sent to find the F-35 missing in the Pacific - cyberwarfare
GitHub - dirkjanm/adidnsdump: Active Directory Integrated DNS dumping by any authenticated user
Quantum breakthrough could lead to 'super-powered' hard disk drives
Watch: Hackers send explicit messages to riders on hacked e-scooters
Money Transfer Comparison: Best International Money Transfer Services
How to find the best international bank account - Telegraph
Best Ways to Send Money Internationally - NerdWallet
Best Debit Cards for International Travel of 2019 (Our Top 5 Picks)
The World's Top 10 Banks
Top International Banks
NSA-Inspired Vulnerability Found in Huawei Laptops - Schneier on Security
Surveillance and our Insecure Infrastructure - Schneier on Security
Security Vulnerabilities in Cell Phone Systems - Schneier on Security
WPA3 - Schneier on Security
China Spying on Undersea Internet Cables - Schneier on Security
New York, Canada, Ireland Launch New Investigations Into Facebook Privacy Breaches
Surveillance: Google collects meta data (phone calls, SMS) from Android phones | Born's Tech and Windows World
Is it safe to use Orbot with the normal Firefox browser on Android - Information Security Stack Exchange
Lightning Network - "Layer 2" payment protocol that operates on top of a blockchain-based cryptocurrency (like Bitcoin) - solution to bitcoin scalability problem- Wikipedia
Bitrefill Brings Crypto to Airbnb - anonymous online payment - Supports Bitcoin, Ethereum, Litecoin, Dash and Dogecoin | The Daily Hodl
Bitrefill: Buy Gift Cards & Top Up Airtime with Bitcoin, Ethereum, Litecoin, Dash, Dogecoin - anonymous online payment - Bitrefill
GitHub - nbs-system/naxsi: NAXSI is an open-source, high performance, low rules maintenance WAF for NGINX
Does the default constructor initialize built-in types? - Stack Overflow
Asus pushes patch after hackers used updates to send malware - malware distribution/spread - CNET
ANNOUNCEMENT: Check Your Router - Kaspersky Lab Discovers Slingshot Malware | Information Security Buzz
IEC 62304 – medical device software – software life cycle processes- Wikipedia
Software of unknown pedigree - SOUP - Wikipedia
Cargo cult programming - Wikipedia
Health informatics - Wikipedia
Health information technology - Wikipedia
Select function in socket programming - Stack Overflow
Therac-25 - famous deadly software bug - Wikipedia
Critical Unpatched Flaw Disclosed in WordPress WooCommerce Extension
GitHub - radareorg/cutter: Free and open-source GUI for radare2 reverse engineering framework
The SIM Swap Fix That the US Isn't Using | WIRED
Towards an Information Operations Kill Chain - a way of thinking about cyber defense in terms of disrupting the attacker's process - Schneier on Security
Applying Security Awareness to the Cyber Kill Chain -. cyberwarfare | SANS Security Awareness
GitHub - mIcHyAmRaNe/okadminfinder3: [ Admin panel finder / Admin Login Page Finder ] ¢σ∂є∂ ву 👻 (❤-❤) 👻
Thousands of firms hit by Beapy malware using NSA hacking tools
Bartek's coding blog: How to Iterate Through Directories in C++
Sending anonymous email - using tor/vpn - Tor Stack Exchange
How 5G is Likely to Put Weather Forecasting at Risk | Hackaday
Les sites marchands sur le Web attribuent secrètement des scores de confiance aux utilisateurs en se basant sur leurs habitudes en ligne - industrial surveillance, privacy
Facebook shareholders are getting fed up with Zuckerberg but can’t do anything about him - financials, company management, CEO ad chairman position - Los Angeles Times
Notre Dame Cathedral fire cause: "Computer glitch" may be behind Notre Dame Cathedral fire, rector says today - disastrous software bug - live updates - CBS News
U.S. intelligence says Huawei funded by Chinese state security: report - Cyberwarfare - Reuters
Vendors must start adding physical on/off switches to devices that can spy on us. - industrial surveillance, consumer privacy violation - webcam privacy – Larry Sanger Blog
Troy Hunt: How to Track Your Kids (and Other People's Kids) With the TicTocTrack Watch - family tracking
UE : le Parlement donne son feu vert à la création d'une gigantesque base de données biométriques, vers un fichage de l'ensemble des citoyens ? privacy, state surveillance
Russians Breached Florida County Computers Before 2016 Election, Mueller Report Says - cyberwarfare - The New York Times
The Future of Cryptocurrency: Why E-commerce is the Answer - Cryptocurrency online payment, safex
The 4 most important files for SSH connections -SSH admin and configuration - TechRepublic
Cybersecurity: This free tool lets you test your hacker defences - pentesting automation | ZDNet
Ransomware Forensics Course - eForensics Magazine
Raspberry Pi Becomes The Encrypted Password Keeper You Need - Hardware Password Secure Storage - good solution | Hackaday
The mysterious history of the MIT License | Opensource.com
How to manage multiple SSH keys - SSH admin and configuration | Opensource.com
Tethering - Wikipedia
What is Tethering and Mobile Data Hotspot? Your complete guide
A Risk Analysis of Huawei 5G - Lawfare
Hacker Breaks Into French Government's New Secure Messaging App Tchap - WhatsApp variant
A Mystery Agent Is Doxing Iran's Hackers and Dumping Their Code - cyberwarfare | WIRED
Mueller Report Fallout Pressures Democrats to Impeach Trump - cyberwarfare | WIRED
WannaCry hero MalwareTech pleads guilty to writing banking malware
Hackers Can Tell What Netflix 'Bandersnatch' Choices You Make | WIRED
Hacker Lexicon: What Is HTTPS? | WIRED
It wasn’t easy, but Netflix will soon use HTTPS to secure video streams | Ars Technica
GitHub - Gymmasssorla/anevicon: A high-performant UDP-based load generator, written in Rust. It sends numerous UDP packets to a server, thereby simulating an activity that can be produced by your end users or a group of hackers.
Excellent Analysis of the Boeing 737 Max Software Problems - Schneier on Security
GitHub - baguswiratmaadi/reverie: Automated Pentest Tools Designed For Parrot Linux
Mueller Makes It Clear: Trump Was Worse Than a 'Useful Idiot' - cyberwarfare | WIRED
DNC Lawsuit Against Russia Reveals New Details About 2016 Hack - cyberwarfare, Russia collusion | WIRED
SSH Advanced admin and configuration cheat sheet
Graphically manage SSH keys with Seahorse - SSH Admin and configuration | Opensource.com
Fauxpen source is bad for business - opensource pitfalls | Opensource.com
GitHub - KALILINUXTRICKSYT/easysploit: EasySploit - Metasploit automation (EASIER and FASTER than EVER)
10 Most Used Nginx Commands Every Linux User Must Know - Nginx SysAdmin
A 'Blockchain Bandit' Is Guessing Private Keys and Scoring Millions - Blockchain hacking | WIRED
Hackers Actively Exploiting Widely-Used Social Share Addon for WordPress - The vulnerable plugin in question is Social Warfare which is a popular and widely deployed WordPress plugin with more than 900,000 downloads. It is used to add social share buttons to a WordPress website or blog.
Building a VPN for Mobile Devices at the Network Level - GGSN, MSISDN, Access Point Name APN - definitive
G7 Comes Out in Favor of Encryption Backdoors - Government Surveillance - Schneier on Security
Don't Praise the Sri Lankan Government for Blocking Facebook - Government Surveillance, Censorship | WIRED
Supply Chain Hackers Snuck Malware Into Videogames | WIRED
Inside the Unnerving CCleaner Supply Chain Attack | WIRED
'Karkoff' Is the New 'DNSpionage' With Selective Targeting Strategy - custom remote administrative tool that uses HTTP and DNS communication to communicate with the attacker-controlled C2 command and control server.
How to enable SSH access using a GPG key for authentication - SSH SysAdmin and configuration | Opensource.com
Getting started with blockchain for Java developers | Opensource.com
Vulnerability in French Government Tchap Chat App - Schneier on Security
GitHub - mxmssh/drAFL: AFL + DynamoRIO = fuzzing binaries with no source code on Linux
How to import your existing SSH keys into your GPG key - SSH SysAdmin and configuration | Opensource.com
Fooling Automated Surveillance Cameras with Patchwork Color Printout - Artificial intelligence hacking - Schneier on Security
Hackers using Google Sites to spread banking malware
DNSpionage group's Karkoff malware selectively pick victims
WiFi finder app exposes millions of WiFi network passwords -plaintext stored passwords, password Secure Storage
is it safe to download files through TOR? TOR vulnerabilties - Tor Stack Exchange
Harvard student Eldo Kim charged in final-exam bomb hoax - TOR vulnerabilties, defective use of TOR - CNN
My ISP/Network/Government has blocked access to the TorProject website. How can I download Tor? Integrity Checking, signature verification - Tor Stack Exchange
How to check if Tor is working and debug the problem on CLI terminal command? - Tor Stack Exchange
Creating a Ransomware With Python - Hakin9 - IT Security Magazine
Can one generalize the Diffie-Hellman key exchange to three or more parties? - Cryptography Stack Exchange
Kerberoasting, exploiting unpatched systems – a day in the life of a Red Teamer - Checkmate
SSL Pinning: Introduction & Bypass for Android - Checkmate
LLMNR/NBT-NS Poisoning in Windows environment - Checkmate
Malware on Steroids - Part 2: Evading Antivirus in a Simulated Organizational Environment - Checkmate
If Kerckhoff's Principle holds, why do we need a cipher at all? - Cryptography Stack Exchange
Number of keys when using symmetric and asymmetric encryption? - Cryptography Stack Exchange
Signatures: RSA compared to ECDSA - Cryptography Stack Exchange
HMAC vs MAC functions - IV initialization vector - vs UMAC , VMAC, CMAC
What is the difference between MAC and HMAC? - Cryptography Stack Exchange
How does PUF hardware help in software activation? licensing system - Cryptography Stack Exchange
Could Diffie-Hellman protocol serve as a zero-knowledge proof of knowledge of discrete logarithm? - Cryptography Stack Exchange
Is there really no use for MD5 anymore? - Cryptography Stack Exchange
How to get Video URL from embedded Link in Twitter - Reverse Engineering Stack Exchange
What are the techniques and tools to obfuscate Python programs? - Reverse Engineering Stack Exchange
Debugging third party android APKs - Reverse Engineering Stack Exchange
Approach to extract useful information from binary file - methodology, resources - definitive breakdown - Reverse Engineering Stack Exchange
How to examine/edit stack memory contents using radare2 in debug mode? px command - Reverse Engineering Stack Exchange
How does changing your password every 90 days increase security? secure password policy, password strength v- Information Security Stack Exchange
How is the "WannaCry" Malware spreading and how should users defend themselves from it? - Information Security Stack Exchange
All 0s (zeros) in a bank card's CVC code - payment card security - Information Security Stack Exchange
Is an up-to-date browser secure on an out-of-date OS? - Information Security Stack Exchange
A mysterious grey-hat is patching people's outdated MikroTik routers - benevolent malware | ZDNet
What are some examples of viruses/exploits, malwares with benevolent purposes? - Information Security Stack Exchange
Are variable time comparisons always a security risk in cryptography code? timing-attack, side-channel -.Padding Oracle attack, Time based Blind SQL Injection attack. - Information Security Stack Exchange
What is the meaning of Triage in Cybersec world? - Information Security Stack Exchange
When is phishing education going too far? training, awareness raising, sensibilization - Information Security Stack Exchange
ISO/IEC 7813 - properties of financial transaction cards, such as ATM or credit cards. - payment card security - Wikipedia
Magnetic stripe card - payment card security, NFC, RFID - Wikipedia
What information about me do stores get via my credit card? payment card security, privacy, anonymity- Information Security Stack Exchange
7 Debugging Techniques to Speed Up Troubleshooting in Production | Toptal
Attack and Defence in Blockchain Technologies Workshop eBook - Hakin9 - IT Security Magazine
WebSocket Implementation with Spring Boot and STOMP | Toptal
Angular vs. React: The Framework Way or the Library Way? | Toptal
How to Work with the React Context API | Toptal
React Tutorial 2019: Part 1 | Toptal
How to know in which language/technology program (.exe) is written? binary analysis, technology detection - Reverse Engineering Stack Exchange
Is the main function's name in the symbol table of C & C++ programs always 'main'? if not, how to find the name? entry point, __libc_start_main, _start functions - freestanding environment - objdump
How to write sequence of machine code in radare2? patching, assembling - Reverse Engineering Stack Exchange
Help needed to extract u-boot kernel & rootfs - nxp lpc 3143 processor - secure boot, flash memory - Reverse Engineering Stack Exchange
How safe are password managers like LastPass? secure password storage/management - online vs offline password manager - master password brute force - server side attack - Information Security Stack Exchange
What is the difference between authorized_keys and known_hosts file for SSH? - Information Security Stack Exchange
How can I export my private key from a Java Keytool keystore? jks vs p12 vs pem- Information Security Stack Exchange
Asymmetric or symmetric - which makes sense in this scenario? - Information Security Stack Exchange
Is it possible to get infected by opening an email in Android Gmail app? Malware spread/distribution/infection through mail - Information Security Stack Exchange
What steps should I take to ensure there are no unpleasant surprises in a recently purchased home? physical security backdoor - WiFi-based cameras - Information Security Stack Exchange
Why does BitLocker not use RSA? TPM, Cold boot attack, LPC bus sniffing - Cryptography Stack Exchange
How do living politicians protect their readily obtainable signatures from misuse? written physical signature forgery -. impersonation - Information Security Stack Exchange
Why do people hide their license plates in the EU? license plate security - physical privacy/anonymity - car security - Information Security Stack Exchange
React Native QR Scanner: An RNCamera Tutorial | Toptal
Cuckoo Sandbox and Malware Analysis - eForensics
DAST vs SAST: A Case for Dynamic Application Security Testing | Acunetix
What do SAST, DAST, IAST and RASP mean to developers?
Differences between SAST, DAST, IAST, and RASP | Synopsys
(1) New Message!
DAST vs SAST: A Case for Dynamic Application Security Testing - DZone Security
Category:OWASP Enterprise Security API - OWASP
The Google Android Security Team’s Classifications for Potentially Harmful Applications - 2017
How secure is Android? Separating the myths from the facts | CIO
How to Implement T9 Search in iOS -Text on 9 keys | Toptal
RSA Proof of Correctness - Cryptography Stack Exchange
Why can't we reverse hashes? one way functions, hash functions - Cryptography Stack Exchange
What makes RSA secure by using prime numbers? - Cryptography Stack Exchange
How will be cipher selected when client is running on version TLS 1.3 and server is running on TLS 1.2? - Cryptography Stack Exchange
PLA’s furtive underwater nukes test the Pentagon - warfare, submarine nuclear weapons
Is openssl rand command cryptographically secure? csprng - Cryptography Stack Exchange
GraphQL API Tutorial - vs REST
Can Shor's algorithm factor multi-prime numbers? post-quantum cryptography - Cryptography Stack Exchange
Xi Jinping's Rocket Force is nullifying U.S. military primacy in Asia - cyberwarfare, missiles technology
Cryptojacking Attacks: Who's Mining on Your Coin?
Avira VPN (2.15.2.28160) Elevation of Privilege through Insecure Update location | enigma0x3
Getting in the Zone: dumping Active Directory DNS using adidnsdump - dirkjanm.io
Hacking JSON Web Token (JWT) – 101-writeups – Medium
Attacking JWT authentication
GitHub - ticarpi/jwt_tool: A toolkit for testing, tweaking and cracking JSON Web Tokens
How to Hack a Weak JWT Implementation with a Timing Attack
Brute Forcing JWT Token (HS256) – Valeriy Shevchenko – Medium
Hacking JSON Web Tokens
JWT Hacking 101 - TrustFoundry
Forging JSON Web Tokens To Win a Prize - DEV Community 👩‍💻👨‍💻
Cracking JWT tokens: a tale of magic, Node.js and parallel computing …
Preventing Mimikatz Attacks – Blue Team – Medium
A Beginner’s Guide to the CVE process | War Room
Evasion & Obfuscation Techniques – z3roTrust – Medium
Evasion & Obfuscation Techniques – z3roTrust – Medium
Cross-Site Request Forgery Cheat Sheet - CSRF - TrustFoundry
Mozilla announces ban on Firefox extensions containing obfuscated code - addon security | ZDNet
The Windows 10 security guide: How to safeguard your business | ZDNet
Engine control unit - ECU - Car Hacking - Wikipedia
Why are there multiple CAN buses in vehicles? Car Hacking/Security - Motor Vehicle Maintenance & Repair Stack Exchange
After odometer/mileage correction, which module data gets changed - Car Hacking/Security -engine or instrument cluster? - Motor Vehicle Maintenance & Repair Stack Exchange
Do we still need to encrypt/decrypt data in Application Layer, despite using TLS/SSL? - Information Security Stack Exchange
Software defense against cold-boot attacks - Information Security Stack Exchange
Is there any protection against malicious devices on a CAN bus?Car Hacking/Security - Information Security Stack Exchange
Why modern car networks are known as "unsafe"? Car Hacking/Security - Motor Vehicle Maintenance & Repair Stack Exchange
Can I remap a car\bike ECU using CAN bus? Car Hacking/Security - Electrical Engineering Stack Exchange
WTF! It Should Not Be Illegal to Hack Your Own Car's Computer -Car Hacking/Security | WIRED
Hack your car for Boost and Power - Car Hacking/Security
Hack your car's mileage by "hypermiling" -. Hack your car for Boost and Power
Latest Top News From ECUFLASH ECU Remapping Specialists - Engine Control Unit Hacking - Car Security
security, privacy, and safety of future automotive embedded systems. Car security/hacking
Hacking Automotive Systems - Car Hacking/Security - Slashdot
Developmemts in Car Hacking - Car Hacking/Security
CAN Bus Hacking - Car Hacking/Security
Hacking into a Vehicle CAN bus (Toyothack and SocketCAN) - Car Hacking/Security | fabiobaltieri
DIY: Odometer Reprogramming: 11 Steps. -Car Hacking/Security
how can i change the mileage stored in the ecu? (harley davidson) - Car Hacking/Security
You Can Hack Your Car for Better Mileage—But Should You? Car Hacking/Security
BMWs Can Now Be Hacked Through A Web Browser, Convienently. -Car Hacking/Security
Piston Slap: Hacking the Unrollable Odometer? Car Hacking/Security
Rolling Back Digital Odometers?Car Hacking/Security | Grassroots Motorsports forum |
Did older car odometers rewind when driving backwards? Car Hacking/Security - Skeptics Stack Exchange
Car hackers mess with speedos, odometers, alarms and locks - Car Hacking/Security - CAN bus - Security - iTnews
Odometer Hacking in the 21st Century: Don't be fooled - Car Hacking/Security - YouTube
Mozilla launches Firefox Send, an encrypted file transfer service - privacy-respectuous alternative
Firefox Just Got an End-to-End Encrypted File Sharing Service. -privacy-respectuous alternative
FBI: End-to-End Encryption Is an Infectious Problem - government Surveillance
Firefox Send — Free Encrypted File Transfer Service Now Available For All. -.privacy-respectuous alternative
GitHub - mozilla/send: Simple, private file sharing from the makers of Firefox - privacy-respectuous alternative
Introducing Firefox Send, Providing Free File Transfers while Keeping your Personal Information Private - The Mozilla Blog
FIREFOX SEND, MOZILLA’S SECURE FILE SHARING SERVICE -privacy-respectuous alternative « Cyber Security
How to Use Mozilla's Firefox Send to Share Large Files Securely. -privacy-respectuous alternative
Mozilla launches Firefox Send, a free, encrypted file-sharing service. -. | ZDNet
Mozilla releases Firefox Send, a free encrypted file transfer service - privacy-respectuous alternative - Help Net Security
Attackers actively exploiting Atlassian Confluence and Oracle WebLogic flaws - Help Net Security
Supply chain attacks: Mitigation and protection - Help Net Security
Firefox Send Is an Easy Way to Share Large Files Securely -privacy-respectuous alternative | WIRED
Firefox Send -privacy-respectuous alternative
Kubernetes Identity Management: Authentication | Linux Journal
GitHub - cool-RR/PySnooper: Python debugger - Never use print for debugging again
How a VPN Review Site Dominates Google Search With a Scam | News & Opinion | PCMag.com
Scientists may have identified a new way to improve network security - Help Net Security
The Rule of Zero in C++ - Rule of Five - Fluent C++
CPU Memory Management, Context Switching
Computer Architecture - Academic course and labs
Threads vs. Processes: A Look At How They Work Within Your Program
Process control block - PCB - CPU Context Switch - Wikipedia
where is PCB stored in memory - context switch - Stack Overflow
Storing and retrieving process control block - PCB - Context Switch - Stack Overflow
Operating Systems: Processes - PCB, context switch, multitasking OS, multiprocessing
Operating Systems: Academic Course Notes Main Page - Security, Protection -
Android System and kernel security - definitive guide - verified boot, selinux, cryptography, sandboxing, Linux filesystem permissions, password protection / Secure storage  |  Android Open Source Project
Android App security best practices - definitive guide - secure communication, secure storage |  Android Developers
Signal 101: How to Password-Protect Your Calls, Texts & Notification Previews - Signal Private Messaging App Hardening « Android :: Gadget Hacks
Protect Individual Apps on Android That You Can Only Unlock with Your Face - App Locker « Android :: Gadget Hacks
Security Tips Every Signal User Should Know - Signal Messaging App Hardening
Signal Private Messaging App for Beginners – Martin Shelton – Medium
5 Privacy-focused Android App Alternatives You Should Try - privacy-respectuous software - private android keyboard
A privacy-friendly Android keyboard? - privacy
Privacy-respectuous foss android keyboard app
Is there a private android keyboard? - privacy-respectuous alternatives
Locking Down Signal Private Messaging : A Guide for Journalists - Hardening – Martin Shelton – Medium
7 security tips to stop apps from stealing your data - CNET
Change These Settings Now to Protect Your Data in Case Your Phone Is Stolen « Android :: Gadget Hacks
Hacking Tesla App - Mobile Security - Car hacking/Security | Promon
Non-Repudiation and Digital Signature [Updated 2018]
Tor Hidden Services: How to Make your Site Visible on the Dark Web
Beware: Many "Best VPN Services" Fall Short of their Privacy Claims - How to choose a VPN
Introduction to Cryptography: Encryption, Digital Signatures, Non-Repudiation, and Much More
Integrity, authentication and confidentiality in public-key cryptography
How to achieve non-repudiation? - Information Security Stack Exchange
What is the difference between authenticity and non-repudiation? - Information Security Stack Exchange
Understanding non-repudiation of origin and non-repudiation of emission
Secure Messaging Apps Comparison Based on Threat Models | Privacy Matters
What is non-repudiation?
WikiLeaks says the CIA can “bypass” Signal Private Messaging App. What does that mean?
Plausible deniability - Non-Repudiation - Deniable Encryption - Wikipedia
Is WhatsApp Safe? 5 Security Threats Users Need to Know About - WhatsApp weaknesses
Encrypted Messaging Apps Have Limitations You Should Know - Private Messaging App Flaws | WIRED
Did Cambridge Analytica Help to Create 'Digital Wokeness'? - Internet Citizen
ransomware - GitLab account hacked and repo wiped - GitLab security - Information Security Stack Exchange
brute force - How secure is Scrypt, really? scrypt vs bcrypt - password hasing function comparison - Information Security Stack Exchange
cryptography - Why are GPUs so good at cracking passwords? GPU-based password hash cracking - Information Security Stack Exchange
Misuse of Language: ‘Cyber’ - cyberwarfare | Threatpost
What is a TPM, and Why Does Windows Need One For Disk Encryption? Truecrypt
Hashcat - CPU-based or GPU-based password hash cracking tool - Wikipedia
GitHub - e-ago/bitcracker: BitCracker is the first open source password cracking tool for memory units encrypted with BitLocker
Nvidia’s GTX 1080 Is Great For Cracking Passwords - GPU-based password cracking | Digital Trends
The Secure Core: How CryptoManager Root of Trust Could Make Spectre and Meltdown Obsolete | Digital Trends
The-CryptoManager-Root-of-Trust - Secure CPU designs - Microprocessors security
Password Cracking Evolution - GPU vs CPU-based password cracking
What hardware to choose when building a GPU based password cracker right now (Q1 2012)? | Champagne and Security
What is the role of GPU in Password Cracking? - Quora
Terahash - High Performance Password Cracking Appliances - GPU-based
Does password cracking require fast CPU, GPU, or large amount of RAM? - Quora
How to build a 8 GPU password cracker — #_shellntel
GPU password cracking made easy - GPU vs CPU-based | Hackaday
Baby steps in x86 assembly - prologue vs epilogue — Idea of the day
assembly - carry flag and subtraction issue - borrow flag, two's complement, signed number representation - Stack Overflow
C++ : What is the order of function pointers inside vtable? - Software Engineering Stack Exchange
Order of fields in C/C++ structs - Stack Overflow
Computer arithmetic operations - Academic Courses and exercises/answers - definitive training course on binary arithmetics fundamentals - overflow, byte order/endiannes, character encoding, Bootstrap process
Remote Shell Attack example - hexadecimal obfuscation
Radix Representation of numbers - conversion binary, decimal, hexadecimal - definitive training tuotorial with exercises/answers
Operating Systems: Security - Academic Course - boot sector virus example - buffer overflow
operating system - Process Context vs Process Control Block - context switch - Stack Overflow
Task State Segment - TSS - OSDev Wiki
Task state segment - TSS - Wikipedia
linux - C program without header - linking, libc, gcc builtin printf - implicit declaration - Stack Overflow
Integer literal - prefixes and integer suffixes - Wikipedia
backdoors in hardware (ie. intel/amd cpu) possible? definitive breakdown - privacy, industrial violations, government surveillance, cyberwarfare - Microcodes, reflashable Firmware, hardware PRNG - plausible deniability, bcrypt - Information Security Stack Exchange
Libreboot - privacy-respectuous alternative for BIOS/UEFI firmware/bootloaders for Operating System boots - secure/encrypted boot, GPG signatures checking before boot - coreboot, depthcharge, GRUB
Libreboot – Frequently Asked Questions - Intel Management Engine IME and AMT Active Management Technology security vulnerabilities - definitive insights on Intel internal flaws and third-party components - AMD Platform Security Processor PSD issues
Best path to OSCP after the fundamentals? Is VulnHub worth it first? : netsecstudents - hacking challenges
OSCP Guide. Where to start, what to read, how to practice. – hacking challenges - Andrew Cheremisov's Blog
Mr. Robot – OSCP-Like Vulnhub Walkthrough – L3nSec - hacking challenges
How Israel Hardware Backdoored - Everything - IME Intel Management Engine - AMD Platform Security System - Cyberwarfare, "israel", China| From the Trenches World ReportFrom the Trenches World Report
Is the Intel Management Engine a backdoor? Active Management Technology (AMT) - IME Intel Management Engine - cold boot attack - privacy violations, government surveillance, nsa - TechRepublic
Intel Refutes Claim That It Includes Backdoors in Its CPUs
CPU backdoors - privacy
Intel x86 CPUs Come with a Secret Backdoor That Nobody Can Touch or Disable - privacy violations, intel management engine IME, Active Management Technology AMT
sound - How can I change audio output to HDMI from command line? - Ask Ubuntu
Why does induction have to be an axiom? - Mathematics Stack Exchange
proof theory - How to prove the mathematical induction is true? - Mathematics Stack Exchange
constructive mathematics - Induction as Peano Axiom - Mathematics Stack Exchange
Is there any axiomatic system in which mathematical induction can be deduced from simpler axioms? - Quora
Mathematical induction - Wikipedia
If and only if - Wikipedia
Necessity and sufficiency - Wikipedia
Find out if websites get loaded from cache and how to force reloads - gHacks Tech News
javascript - Is My Page Being Loaded from the Browser Cache? - Stack Overflow
caching - What is the proper way to tell the browser not to cache? - Stack Overflow
Detecting when a page is loaded from the browser cache - Karl O'Keeffe
MacroFusion in Intel CPUs. | Denis Bakhvalov | C++ compiler dev.
Analyzing Malicious PDFs
malware - How to detect malicious fb2 & epub file? epub security, malwares - Information Security Stack Exchange
Can ePUBs or PDFs contain malware ? - Quora
Btrfs - copy-on-write B-Tree FileSystem - Wikipedia
dmesg - display/driver message - vs syslog logging daemon - Wikipedia
Dirty/Modified bit - filesystem modification/corruption - memory block - Wikipedia
fsck - file system consistency check- Wikipedia
linux - How to unmount a busy device - Stack Overflow
Filesystem library - cppreference.com
flipcode - Programming a Virtual File System
Initrd - initramdisk - OSDev Wiki
I use a Custom Filesystem - What Bootloader Solution is right for me? - OSDev Wiki
File Systems - Theory, Indexing methods - Allocation table - Network Filesystem - OSDev Wiki
Writing GRUB Modules - OSDev Wiki
Roll Your Own Filesystem - OSDev Wiki
boot - Why is the root filesystem is loaded into a ramdisk? initrd, initramdisk, initramfs - - Stack Overflow
Are there any artifacts for filesystem forensics in memory? rootkit/malware analysis - Information Security Stack Exchange
kernel - What's the difference of dmesg output and /var/log/messages? vs syslogd, klogd - Unix & Linux Stack Exchange
How to check syslog in Bash on Linux? output recent log - Stack Overflow
Understanding /etc/shadow file format - nixCraft
Keeping OSMC secure - IoT / smart home security - General - OSMC
Usernames and passwords - security, enabling root account/password - smart home security, IoT security - General - OSMC
Linux Log Files Location And How Do I View Logs Files on Linux? systlog, rsyslog{.conf,.d} - nixCraft
Download a file over an active SSH session - scp alternative - Ask Ubuntu
Copy a file back to local system with ssh - scp alternative - Unix & Linux Stack Exchange
STICKY: Is your Pi not booting? (The Boot Problems Sticky) - definitive troubleshooting guide - Green /ACT LED blinking patterns meaning - Raspberry Pi Forums
R-Pi Troubleshooting - definitive troubleshooting guide - booting issues - eLinux.org
GitHub - hermanhermitage/videocoreiv: Tools and information for the Broadcom VideoCore IV (RaspberryPi) - reverse engineering
sdcard - What causes an SD card to go corrupt? - Photography Stack Exchange
What can I do if my USB flash drive is write-protected or read-only? - Super User
permissions - MicroSD card is write protected - Super User
Download specific folder from git repo - DownGit
kernel - How does Raspberry Pi boot? - Raspberry Pi Stack Exchange
Raspberry Pi boot process - Raspberry Pi Forums
SD card - SDIO (Secure Digital Input Output) - Secure Digital Card -
Running scripts on startup and shutdown - service vs rc.local - General - OSMC
What are some IP addresses that might indicate I have a network problem? Network Troubleshooting - Automatic Private IP address 169.254 - Link-local address
What would the IP address 169.254.x.x signify? Automatic Private Address - Link-local address - Quora
Link-local address = Stateless Address Autoconfiguration = Link-local Address Autoconfiguration - Automatic private address - DHCP - Wikipedia
linux - Where does the route to 169.254.0.0 comes from? Automatic Private Address - Link-local Address - Server Fault
wireless networking - Network devices getting an IP address in the 169.254.x.x range? Automating Private IP Address - Link-local address - Super User
169.254.0.0/16 addresses explained - Automating Private IP Address - Link-local address - PacketLife.net
10 Steps to Secure Open SSH - Hardening - The Devolutions Blog
ssh - Is it possible to list usernames of a remote machine knowing the IP address only? enumeration of target's users - Super User
definitive - What are the concepts of "kernel ring buffer", "user level", "log level"? saves logs before syslogd starts up - Unix & Linux Stack Exchange
logging - How to read ring buffer within linux kernel space? - Stack Overflow
linux - /etc/lsb-release vs /etc/os-release - Stack Overflow
linux - How can I reliably get the underlying operating system's name? lsb_release - Unix & Linux Stack Exchange
ssh - How can I tell what version of Linux I'm using? - Unix & Linux Stack Exchange
How do I make bash warn me when overwriting an existing file? cp, mv interactive - Ask Ubuntu
ssh - scp without replacing existing files in the destination - rsync - Unix & Linux Stack Exchange
scp: Do not Overwrite Existing File On Linux or Unix System - rsync - nixCraft
How to fix Raspberry Pi boot problems - boot sequence - LED blinking patterns | TechRadar
Howto Extract Zip Files in a Linux and Unix-like Systems - unzip - nixCraft
How to mount a disk image from the command line? - Unix & Linux Stack Exchange
linux - Ubuntu - mount image file with r/w permission - Super User
filesystems - How to find the type of an img file and mount it? definitive - Unix & Linux Stack Exchange
access control - Security purpose of asking admin password to mount partition on Linux - setuid/setgid - device nodes - passwd, ssh/authorized_keys - filesystem drivers - /etc/fstab - mount options nosuid, nodev, noexec - Information Security Stack Exchange
dual boot - How to disable password prompt while mounting partitions? mount - Ask Ubuntu
All Linux Distributions Store Wi-Fi Passwords in Plain Text If You Don’t Use Encryption - FDE - Hardening - Password secure storage
ubuntu - Where are NetworkManager's WiFi settings stored? - Unix & Linux Stack Exchange
c++ - 'friend' functions and << operator overloading: What is the proper way to overload an operator for a class? friend function vs member function - Stack Overflow
c++ - What are the basic rules and idioms for operator overloading? stream insertion operator << - Stack Overflow
privacy - What is fungibility and why does it matter? vs Bitcoin - Anonymous/Private Cryptocurrency - Payment Online - Traceability - Blockchain Transactions History - Dash, ZCash - Monero Stack Exchange
MINIX - Wikipedia
Open Letter to Intel by Tanembaum - MINIX use in Intel Management Engine - privacy, surveiallance, security - israel - cyberwarfare
The Truth About the Intel’s Hidden Minix OS and Security Concerns - MINIX use in Intel Management Engine - privacy, surveiallance, security - israel - cyberwarfare - kernel rings, ring 3 - It's FOSS
The Greatest OS That (N)ever Was - Linux Development story - Linus Torvald | WIRED
How to Build a PC | WIRED
An Open Letter to IBM's Open Letter - IBM leaking private data to NSA/PRISM - cyberwarfare - Government Mass Surveillance - privacy - backdoors - Schneier on Security
A Security Assessment of the Internet Protocol - Schneier on Security
NSA Increasing Security by Firing 90% of Its Sysadmins - Mass surveillance - Schneier on Security
Whitelisting vs. Blacklisting - Schneier on Security
privacy - What can I do about the Intel Management Engine? - Information Security Stack Exchange
Positive Technologies - learn and secure : Disabling Intel Management Engine 11 via undocumented mode
Sakaki's EFI Install Guide/Disabling the Intel Management Engine - Gentoo Wiki
Here's How To Disable Intel Management Engine And Slam Its Alleged Security Backdoor Shut | HotHardware
​Computer vendors start disabling Intel Management Engine | ZDNet
How to completely deactivate Intel Management Engine AMT
Deep dive into Intel Management Engine disablement – Purism
What You Need To Know About The Intel Management Engine - defintive summary - physical access | Hackaday
Eureka! The Intel Management Engine can finally be disabled, thanks to the NSA - NotebookCheck.net News
Intel Management Engine, Explained: The Tiny Computer Inside Your CPU - definitive breakdown
Intel Management Engine (ME) - disable it - the better way! · GitHub
The Intel Management Engine: an attack on computer users' freedom — Free Software Foundation — defintiive article - free software foundation
Intel's Management Engine is a security hazard, and users need a way to disable it - definitive explanation | Electronic Frontier Foundation
Do AMD-processors have something like Intel Management Engine? : security
Neutralizing Intel’s Management Engine - disabling | Hackaday
Chinese Supply Chain Hardware Attack - Schneier on Security
Adding Backdoors at the Chip Level - Hardware malware - Intel Management Engine - Schneier on Security
NSA Falldown/Forfeiture/Crisis - Schneier on Security
Tamper-Snowden's Detection App for Android - Protecting against Physical Access Attacks - Schneier on Security
"Evil Maid" Attacks on Encrypted Hard Drives - Full Disk Encryption FDE - - Schneier on Security
Edward Snowden’s Android App "Haven" Guards Your Laptop - Protecting against Physical Access Attacks
The US Senate Is Using Signal Private Messaging - cyberwarfare -Schneier on Security
Any Half-Decent Hacker Could Break Into Trump's Mar-a-Lago luxurious resort - cyberwarfare — ProPublica
Using Intel's SGX to Attack Itself - Software Guard Extensions - Schneier on Security
Evil maid attack - Physical Access - Wikipedia
Fungibility - Cryptocurrency - Wikipedia
The difference between fungible and non-fungible cryptocurrency tokens
Cryptocurrency and Fungibility | Markshire Crypto
VIA Nano - CPU builder - Intel and AMD alternatives - Wikipedia
11 Brands You'll Have To Let Go If You Want To Boycott Israel • Menzene.com | Cyberwarfare - Zionist Brands To Boycott World Observer Online
Addition - Carry - Wikipedia
Inline Functions in C++ - GeeksforGeeks
Argument-dependent lookup - ADL - Koenig lookup - cppreference.com
const type qualifier in C - cppreference.com
c++ - What are qualified-id/name and unqualified-id/name? - Stack Overflow
c++ - What's the scope of inline friend functions? ADl, unqualied id - Stack Overflow
Class declaration - local/non-local class - cppreference.com
c++ - Friend function in-class definition only allowed in non-local class definitions. What does it mean? - Stack Overflow
Local Classes in C++ - GeeksforGeeks
design patterns - Usage of local class in C++ function - Stack Overflow
c++ - What is the point of the complicated scoping rules for friend declarations? - Stack Overflow
In C++, what is the difference between defining a friend function inside the class vs defining it outside the class? - Quora
Category:Cryptographic hardware - Hardware hacking/security - Wikipedia
Degaussing - Secure Deletion/Erasure, Data remanence - Wikipedia
Scrap metal shredder - Physical Shredder - Secure Deletion/Erasure - Wikipedia
Key management - Key Secure Storage - PKI
Password management - - Password Secure Storage/Retrieval - Wikipedia
Startpage.com = Ixquick- Wikipedia
Deniable encryption - Wikipedia
ARP spoofing - ARP cache poisoning, or ARP poison routing
WhatsApp - End-o-End Encryption implementation with Signal open-source library - Wikipedia
Trust on/upon first use - TOFU/TUFU - Wikipedia
Secure Real-time Transport Protocol - SRTP - Wikipedia
Facebook & Privacy - 7 Chilling Facts You Are Not Being Told - shadow profiles
Unlock hard drive vs full-disk encryption - BIOS boot password VS Drive locking mechanisms (e.g. HP DriveLock) VS FDE Full disk encryption (e.g. TrueCrypt / OpenPGP) - Information Security Stack Exchange
EFI/BIOS password VS Hard Drive Password VS FDE Full Disk Encryption Security? BIOS/CMOS memory, HDD ATA specifications, physical access - Self-Encrypting Drives SED - EEPROM - TPM - MMC - hdparm - Drive Password DecrypterSuper User
Bypass BIOS Boot Password or OS Login Password to "most" Any Computer ... With Console Access: 6 Steps - EPROM/CMOS - Flash - EFS/DES/PGP
How to Hack a computer by resetting the bios password « Computer Hardware :: WonderHowTo
How to Bypass or Remove a BIOS Password - Technibble
How To Encrypt A Flash Drive MAC | Windows | Linux | Ubuntu - 2018 | Beencrypted
C++ - std::scanf, std::fscanf, std::sscanf - cppreference.com
GitHub - cbiffle/minimal-embedded-rust: Example code and build environment for Rust on Cortex-M4.
GitHub - memfault/zero-to-main: Bootstrap C code on a Cortex-M MCU
c - Pointer to a specific fixed address - memory mapped I/O macro - volatile - Stack Overflow
Do you use NULL or 0 (zero) for pointers in C++? nullptr - Stack Overflow
c++ - nullptr vs __nullptr - C++/CLI CLR - Managed/Native code - Stack Overflow
C++ Class, What's the difference in-class friend operator definition vs outside-class definition - Stack Overflow
c++ - What does it mean when you declare a friend and then define it inside a class? - Stack Overflow
Testing Guide Introduction -Threat Modeling - Security By design - Source Code Review/Audit - Penetration Tests - OWASP
file permissions - Why does ping require the setuid bit? ICMP packets, raw sockets security issue, CAP_NET_RAW capability, xattrs - ICMP socket type - Super User
Getting rid of setuid-root binary - ICMP sockets [LWN.net]
permissions - Why do mount, ping/ping6 and su have a setuid bit set? crontab has setgid and crontab directory has sticky bit - Ask Ubuntu
command line - What is the first number for in a 4-number chmod argument (such as `chmod 4555`)? Special attributes chmod output - Permissions - Setuid, Setgid an Sticky bit - Ask Ubuntu
How to use setuid to install a root backdoor - Why You Can't Un-Root a Compromised Machine - definitive examples · GitHub
linux - /usr/bin/passwd and the CAP_CHOWN capability - definitive breakdown relationship Linux-PAM (Pluggable Authentication Module) and /etc/passwd, /etc/shadow and passwd command, /etc/.pwd.lock, /etc/nshadow - Stack Overflow
setuid - How do real and effective user IDs work? SELinux, hacks examples using setuid privileges - Unix & Linux Stack Exchange
[Apache-SVN] Contents of /httpd/httpd/trunk/support/suexec.c - setuid code example
linux - How does the 'passwd' command gain root user permissions? setuid root, security issues, privileges escalation - Unix & Linux Stack Exchange
PF (firewall) - stateful packet filter - comparable to netfilter (iptables), ipfw, and ipfilter - Wikipedia
Meltdown: Reading Kernel Memory from User Space
gddr6 at DuckDuckGo
SO-DIMM socket , Dual-channel at DuckDuckGo
vram at DuckDuckGo
gddr vs ddr memory at DuckDuckGo
sd vs sdhc vs sdxc memory cards at DuckDuckGo
std::strncmp in C++ - cppreference.com
kernel yama ptrace_scope - /proc/sys/kernel/yama/ptrace_scope - CAP_SYS_PTRACE
Protect against ptrace of processes: kernel.yama.ptrace_scope
What is this error and how do I fix it? Definitive answer - relationship between /etc/sysctl.d/10-ptrace.conf VS /proc/sys/kernel/yama/ptrace_scope
StartMail - Private & encrypted email made easy - privacy-respectuous alternative - email providers
No More Google - definitive privacy-respectuous alternatives list
FastMail vs Protonmail vs Startmail vs Tutanota? : ProtonMail
How do ProtonMail and StartMail compare? - Quora
Drone Forensics - IoT security - cyberwarfare - eForensics
Sysdig vs DTrace vs Strace: A technical discussion - ptrace - paid solution - | Sysdig
How does ltrace work? definitive in-depth explanation - strace, ptrace -ELF format - Library functions call, Procedure Linkage Table PLT, Global Offset Table GOT - Program loading sequence, DSO Dynamic Shared Object, trampoline assembly instructions - breakpoint - PTRACE_POKETEXT to modify memory in running program - SIGTRAP signal - debuggers internals -
How does strace work? definitive in-depth technical insights -ptrace system call, debuggers internals - kernel/ptrace.c source code pick - PTRACE_ATTACH, PTRACE_SYSCALL, __ptrace_may_access security check - flag PT_PTRACED - CPU specific arch_ptrace at arch/x86/kernel/ptrace.c - Packagecloud Blog
strace cheat sheet - Packagecloud Blog
How to use strace and ltrace commands in Linux – The Geek Diary
What is the difference between DTrace and STrace? - Quora
c++ - Are memory leaks ever ok? - Stack Overflow
Why We Should All Be Using the Encrypted Chat App Signal | WIRED
Intel x86 JMP family instructions quick reference - JO/JNO, JS/JNS, JE/JZ, JNE/JNZ, JP/JPE, JNP/JPO, JCXZ/JNCXZ, JB/JNAE/JC, JNB/JAE/JNC, JBE/JNA, JA/JNBE, JL/JNGE, JGE/JNL, JLE/JNG, JG/JNLE - definitive equivalence between x86 Jcc Jump family instructions with respect to status flags CF,OF,SF,ZF etc - after CMP -
Multithreading (computer architecture) - Wikipedia
Thread safety - multithreading - re-entrancy - thread-local storage - immutable objects - mutual exclusion mutex - atomic operations - Wikipedia
Reading 20: Thread Safety - multithreading - confinement, avoiding global variables - immutability,
Decorator pattern - design pattern - Wikipedia
oop - Decorator pattern on the real example in C++ - design pattern - Stack Overflow
struct - Creating "classes" in C, on the stack vs the heap? Oriented Object Programming in C - struct inhertance - Stack Overflow
structure - Struct Inheritance in C - OOP - Stack Overflow
Implement inheritance in C - OOP - Software Engineering Stack Exchange
Connect to Your Home Network From Anywhere with OpenVPN Server and Tomato - VPN Server in home LAN
Connect Your Home LAN Router to a VPN Client to Bypass Censorship, Filtering, and More
VPN client Routers - Ultimate Guide (Setup, Test Results, Best VPN Routers) - Flashing BPN router firmware - OpenWRT vs DD-WRT vs Tomato/Advanced Tomato vs Merlin AsusWRT vs pfSense - performance/speed - Policy-based routing/selective routing - Kill Swith on VPN router - definitive in-depth guide
Ultimate guide to VPN routers and setup options - definitive | Comparitech
Guidance to avoiding vulnerabilities in programming languages–Part 3 –Vulnerability descriptions for the programming language C - definitive secure coding overview - buffer overflow, floating-point arithmetic, string termination, pointer arithmetics, null pointer dereference, function passing parameters/return value, recursion, memory leak/heap fragmentation, inheritance, Liskov substitution principle violate, self-modifying code, Undefined/Unspecified/Implementation-Defined Behavior - concurrency
Variadic arguments in C++ - Default conversion - cppreference.com
C syntax - storage class specifiers auto/register/static/extern/(none) definitive breakdown - rodata, ROM memory - Wikipedia
c - External variable declaration and definition at the same time - extern optional is this case - definitive answer for this particular case - Stack Overflow
Hiding Metasploit Shellcode to Evade Windows Defender - antivirus evasion
Through a series of levels you'll learn about common mistakes and gotchas when using Amazon Web Services (AWS)
Cross-Site Request Forgery Attack -CSRF - YouTube
What determines the number of bits for the address field in a cache memory? lines - Electrical Engineering Stack Exchange
Project iKy is a tool that collects information from an email and shows results in a nice visual interface. Graphics visualization
GitHub - AaronSoria/PAnalizer
What is VPS Hosting? How Does it Work?
Don't test in production? Test in production! | Opensource.com
SHA-1 collision attacks are now actually practical and a looming danger | ZDNet
SIM hijacking ring which stole millions in cryptocurrency dismantled by feds | ZDNet
Reverse Engineering a Chinese Surveillance App - cyberwarfare - uigur muslims persecution - Schneier on Security
GitHub - JannisKirschner/Horn3t: Powerful Visual Subdomain Enumeration at the Click of a Mouse
Sim swapping hackers charged with stealing $2.5m worth of crypto
North Korean cyberspies deploy new malware that harvests Bluetooth data - ScarCruft APT group| ZDNet
A Cisco Router Bug Has Massive Global Implications | WIRED
Thrangrycat flaw lets attackers plant persistent backdoors on Cisco gear - router | ZDNet
How Tech Helped the NSC Change the US Way of War - cyberwarfare | WIRED
Hackers Used WhatsApp 0-Day Flaw to Secretly Install Spyware On Phones
Cryptocurrency Hacks Still Growing — What Does That Mean for the Industry?
Flaw Affecting Millions of Cisco Devices Let Attackers Implant Persistent Backdoor - ThrAngryCat secure boot bypass , router
Update WhatsApp now: Bug lets snoopers put spyware on your phone with just a call | ZDNet
Over 25,000 smart Linksys routers are leaking sensitive data | ZDNet
Cryptanalysis of NSA's SIMON-32/64 cipher - Schneier on Security
Quantum Computing and Cryptography - post-quantum - Schneier on Security
Can we ensure the security of a crypto-algorithm and -implementaton against acoustic cryptanalysis? Quantum Key Exchange - Cryptography Stack Exchange
New Class of CPU Flaws Affect Almost Every Intel Processor Since 2011 -Speculative execution, Fallout, Zombiload
New Intel AMT Security Issue Lets Hackers Gain Full Control of Laptops in 30 Seconds
Microsoft: Forget Google, Facebook – log in with our new blockchain ID | ZDNet
ASUS WebStorage abused to spy on users at the router level | ZDNet
WhatsApp flaw lets hackers install spyware on iOS & Android devices
Single server ties hacked diplomatic cables to Chinese cyberattacks worldwide | ZDNet
How Hackers Broke WhatsApp With Just a Phone Call | WIRED
Intel CPUs impacted by new Zombieload side-channel attack | ZDNet
Intel Flaw Lets Hackers Siphon Secrets from Millions of PCs - MDS, Fallçut, Zombileload,
Wyze Sense review: Wyze continues its 'too good to be true' approach Review - security camera | ZDNet
Linux vs. Zombieload | ZDNet
MDS 'Zombieload' attacks against Intel CPUs: What's your patch status? | ZDNet
GitHub - Leviathan36/trigmap: A wrapper for Nmap to automate the pentest
How to Find Linux Server Geographic Location in Terminal
Microsoft: 'We're detecting 5 billion cybersecurity threats on devices a month' - Intelligence Security Graph | ZDNet
Hackers interrupt Eurovision webcast in Israel with missile attack alert
Amazon, Apple, Google & Microsoft issue patches to fix ZombieLoad bug
Microsoft’s First Windows XP Patch in Years Is a Very Bad Sign - Wannacry like potential attack | WIRED
Google Will Replace Titan Security Key Over a Bluetooth Flaw | WIRED
WhatsApp Vulnerability Fixed - NSO Israeli group - Schneier on Security
Microsoft releases new version of Attack Surface Analyzer utility | ZDNet
Bluetooth Flaw Found in Google Titan Security Keys; Get Free Replacement
'GozNym' Banking Malware Gang Dismantled by International Law Enforcement
Another Intel Chip Flaw - Zombieload, fallout - Schneier on Security
Goznym Takedown Shows the Anatomy of a Modern Cybercriminal Supply Chain | WIRED
More Attacks against Computer Automatic Update Systems - supply chain - Schneier on Security
Supply-Chain Security - Schneier on Security
The Future of Wi-Fi Security: Assessing Vulnerabilities in WPA3
Cybercrime group that used malware to steal $100 million from online banking accounts shut down | ZDNet
Hacktivist attacks dropped by 95% since 2015 - Anonymous | ZDNet
North Korean cyberspies deploy new malware that harvests Bluetooth data - ScarCruft group | ZDNet
Russian cyberspies are using one hell of a clever Microsoft Exchange backdoor - Turla APT | ZDNet
The Dark Web is smaller, and may be less dangerous, than we think - TechRepublic
Game of Thrones has the most malware of any pirated TV show - malware spreading
Chinese cyberspies breached TeamViewer in 2016 | ZDNet
Stack Overflow website breach, hacker went undetected for a week | ZDNet
XSS flaw in Live Chat Plugin lets attackers compromise WordPress sites
TeamViewer Confirms Undisclosed Breach From 2016
Russia Just Scrambled Half of Its Su-57 Stealth Fighter Fleet For 1 Reason - CyberWarfare | The National Interest
Positive Technologies - learn and secure : Disabling Intel Management Engine 11 via undocumented mode
Snort (software) - Wikipedia
Question - Quora
Question - Quora
My deep dive into one of the largest dark web hacking forums | Dylan Curran | Opinion | The Guardian
10 Best Deep Web Hacker Forums
The best hacker forums in the internet ( top 5 )
Iran builds firewall against Stuxnet computer virus: minister - Reuters
Question - Quora
bootloader vs boot code at DuckDuckGo
bootloader vs bios at DuckDuckGo
What is the relation between address lines and memory? - Stack Overflow
Question - Quora
Question - Quora
Need little more clarification on address lines of processor - Stack Overflow
how does /proc/cpuinfo address size information relates to memory page size? - Stack Overflow
What is the difference between 32-bit PAE and 64-bit kernels? - Unix & Linux Stack Exchange
Linux Find Out CPU Support 36-bit Physical Addressing Or Not - nixCraft
Dude, Where's My 4 Gigabytes of RAM?
Is there way to enable more than 4 GB RAM in 32-bit Windows OS? - Super User
Why 32bits OSs can't address more than 3.2/3.2 gb of memory? - Super User
Why can't x86 (32-bit) operating systems use more than 3.25 GB of RAM memory and not whole 4 GB? - Super User
Porting to 64-Bit Intel® Architecture | Intel® Software
Question - Quora
Question - Quora
64 bit - Is 4GB Ram sufficient for a 64 bit OS - Super User
NVMe SSDs: Everything you need to know about this insanely fast storage | PCWorld
Does Cache Size Really Boost Performance?
Is the cache size or number of cores more important when weighing CPU performance? - Super User
How does more L2/L3 cpu cache impact gaming? - Amd
cpu cache effects on high resolution gaming | Tom's Hardware Forum
Phishing Attack Prevention: 10 Ways To Prevent Email Phishing Attacks
Try to deobfuscate multi layered javascript - Reverse Engineering Stack Exchange
WhatsApp security issues: Hackers attack iPhones and Androids with code
New Details Emerge of Fxmsp's Hacking of Antivirus Companies - Hacking Cybersecurity companies
It's Time To Pay Attention To Intel's Clear Linux OS Project
How to use SSHFS to Mount Remote Directories over SSH | Linuxize
Question - Quora
What is the difference between the firmware and the operating system? - Stack Overflow
Security lapse exposed a Chinese smart city state surveillance system - Big Brother | TechCrunch
Top Russian Hacking Group Breaches Three AV Companies - Cybersecurity companies breached - Infosecurity Magazine
5G : les 4 critères du gouvernement pour l'attribution des licences - 5G security, French government criteria | Silicon
Cybersécurité : le « credential stuffing » coûte cher aux entreprises | Silicon
Avec SecureLink, Orange conforte son rang dans la cybersecurity | Silicon
Vulnérabilité : les 3 critères qui doivent vous alerter - CVSS version 3 issues – Silicon
What is DDR (Double Data Rate) Memory and SDRAM Memory
What is the difference between SDRAM, DDR1, DDR2, DDR3 and DDR4? - Support & Download
Question - Quora
What are the differences between DRAM and Flash? transistors vs magnetic hard drives
Question - Quora
Question - Quora
Question - Quora
Question - Quora
RAM production and manufacturing
Question - Quora
Why is DRAM so slow? - Quora
Why is SRAM more expensive then DRAM? - Quora
(1) How does DRAM work? - Quora
What Happens If You Put the Wrong Gas in Your Car? | Fuel Express
Synchronous dynamic random-access memory - SDRAM - Wikipedia
(1) Can you explain NAND versus DRAM? - Quora
DDR3 vs DDR4 RAM: Is It Worth The Upgrade? | Beebom
MRAM vs SRAM vs DRAM-Difference between MRAM,SRAM and DRAM
sdram vs ram vs dram at DuckDuckGo
Security/Tor Uplift/Tracking -To uplift all of the Tor Browser patches to mainline Firefox - MozillaWiki
Decrypting Eazfuscator.NET encrypted symbol names – deobfuscator - Silent Signal Techblog
Pics of IDF women soldiers helped hackers to breach Israeli Military Servers - Cybersecurity
Exploring Mimikatz - Part 1 - WDigest
In a first, Israel responds to Hamas hackers with an air strike | ZDNet
Israel Neutralizes Cyber Attack by Blowing Up A Building With Hackers
Protecting Yourself from Identity Theft - Schneier on Security
The security and privacy implications of drones | ZDNet
This is how hacked Israeli drone feeds look like
Israel’s Major Traffic Tunnel Hit by a Massive Cyber-Attack, Causing Huge Financial Damage.
Israel’s Channel 10 TV Station Hacked by Hamas
Israeli Security Camera Systems targeted by Pro-Hezbollah Hackers
Hamas Compromised Dozens of IDF Soldiers’ Phones Using Seductive Female Images
Israel claims to bomb Hamas's cyber Ops HQ amidst uncertainties
Malvertiser behind 100+ million malicious ads arrested and extradited to the US | malware spreading - ZDNet
Chinese Hackers Used NSA Hacking Tools Before Shadow Brokers Leaked Them
Microsoft Windows 10 will get a full built-in Linux Kernel for WSL 2 - Windows Subsystem For Linux
The Strange Journey of an NSA Zero-Day—Into Multiple Enemies' Hands - shadow brokers | WIRED
Singapore seeks public consultation on 5G policies and deployment - security risks | ZDNet
Chinese hackers were using NSA malware a year before Shadow Brokers leak | ZDNet
How difficult is to decompile C++ file? string dumping hte xxd od - Reverse Engineering Stack Exchange
Converting assembly code to c - decompiler - Reverse Engineering Stack Exchange
What are the differences between credential stuffing and password spraying? - Information Security Stack Exchange
What is more safe for browsing the web: PC or smartphone? browser security android, PC - Information Security Stack Exchange
Intentionally slow decryption - Key Derivation Function - PBKDF2, Argon2, and scrypt - Information Security Stack Exchange
How to explain Heartbleed without technical terms? - Information Security Stack Exchange
How can I explain SQL injection without technical jargon? definitive non technical explanation
explained elsewhere
Is using SHA-512 for storing passwords tolerable? password hash crack brute forcing - Information Security Stack Exchange
Why are salted hashes more secure for password storage? crypt, bcrypt, scrypt, PBKDF2 - Information Security Stack Exchange
DerbyCon 3 0 3202 Antivirus Evasion Lessons Learned Thelightcosine - YouTube
New Cybersecurity Regulations About to Hit Everyone - GDPR - Pentestmag
Breaking Research: LockerGoga Ransomware Impacts Norsk Hydro - Pentestmag
The Hard Life Of Exploit Developers - Pentestmag
IoT Security- it's complicated - Pentestmag
My OSCP / PWK Course Review - Training/Preparation – My Learning Journey
This is a write-up on the Gemini Inc: 1, a VulnHub machine designed to be vulnerable. - Challenges
Cybersecurity in Australia: April 2019 Gridware Roundup - cyberwarfare - Pentestmag
Researchers Warn of Office 365 Account Takeover Deluge - security - Infosecurity Magazine
Xena (software). - use in digital preservation. Xena is short for XML Electronic Normalising for Archives. - Wikipedia
AD-Attack-Defense/README.md at master · infosecn1nja/AD-Attack-Defense · GitHub
Keylength - Cryptographic Key Length Recommendation - Lenstra and Verheul Equations (2000) - Lenstra Updated Equations (2004) - ECRYPT-CSA Recommendations (2018) - NIST Recommendations (2016) - ANSSI Recommendations (2014) - IAD-NSA CNSA Suite (2016) - Network Working Group RFC3766 (2004) - BSI Recommendations (2018)
Digital obsolescence - Wikipedia
Identifying a bad public key - Cryptography Stack Exchange
Choosing the size of an S-box - Cryptography Stack Exchange
What is the difference between .pem , .csr , .key and .crt? - Cryptography Stack Exchange
What is Attribute Based Encryption? ABE - Cryptography Stack Exchange
LDAP authentication - ArchWiki
5 quick SSH hardening tips - TechRepublic
Mozilla explains why all Firefox add-ons broke at once - Firefox bug addon signature verification failure
Security Incident Response (W43) - Hakin9 - IT Security Magazine
Add-ons disabled or failing to install in Firefox - Signature verification | Mozilla Add-ons Blog
New Intel firmware boot verification bypass enables low-level backdoors - Researchers Peter Bosch and Trammell Hudson presented a time-of-check, time-of-use (TOCTOU) attack against the Boot Guard feature of Intel's reference Unified Extensible Firmware Interface (UEFI) implementation - secure boot | CSO Online
Microsoft SharePoint servers are under attack | ZDNet
Hackers breached 3 US antivirus companies, researchers reveal – Ars Technica
Turkey fines Facebook for December 2018 API bug | ZDNet
DOJ Says Chinese Hackers Attacked Anthem Health Insurance , but Not Why | WIRED
Hackers steal source code of top anti-virus firms to sell online -Fxsmsp Threat Group, “a credible hacking collective” is offering to sell source code of major anti-virus software. vulnerability market
U.S. Charges 9 'SIM Swapping' Attackers For Stealing $2.5 Million
Cryptanalyzing a Pair of Russian Encryption Algorithms -flawed S-box that is almost certainly an intentional backdoor- government surveillance - Schneier on Security
Cybersecurity: This is how Microsoft Defender ATP tackles password-stealing credential dumping attempts | ZDNet
North Korea debuts new Electricfish malware in Hidden Cobra campaigns | ZDNet
Useful Commands to Manage Apache Web Server in Linux
Two crypto-mining groups are fighting a turf war over unsecured Linux servers | ZDNet
North Korean Hackers Using ELECTRICFISH Tunnels to Exfiltrate Data
Mozilla to track infrastructure time-bombs in wake of recent Firefox armagadd-on - addon signature verification | ZDNet
US charges one of the Health Insurance Anthem hackers | ZDNet
Hackers steal Amazon sellers' funds in "extensive" attack
Another NSA Leaker Identified and Charged - anonymity throughout attack - Schneier on Security
Build Your Own PenTest Lab - Workshop eBook - eForensics
It's Not About Tech and Tools: Discover DevOps Communication | Toptal
Are there any surveillance cameras/devices that are EU General Data Protection Regulation (GDPR) compliant? security, privacy - Internet of Things Stack Exchange
Where can I harvest energy in my home to power my wireless sensors? sustainable energy - Internet of Things Stack Exchange
Is there any open source firmware or OS for IP camera like openwrt for routers - Internet of Things Stack Exchange
Is there any discussion about creating one-time use Monero addresses? private anonymous cryptoccurrency, anonymous payment - Monero Stack Exchange
why do I get "Access Denied" at certain web sites when I didn't last year? exit nodes ban,Tails use - Tor Stack Exchange
Where I can find, export or download the biggest list of all .onion addresses? Hidden Service lists and search engines available at OnionDir - Deep Web Link Directory. - Tor Stack Exchange
How can one make Tor faster, when willing to to sacrifice anonymity? - Tor Stack Exchange
Tails (operating system) - The Amnesic Incognito Live System is a security-focused Debian-based Linux distribution aimed at preserving privacy and anonymity - Wikipedia
Tails - Running Tails in a virtual machine - security risks
Why guard and exit nodes are allowed to be from same country? - Tor Stack Exchange
How can I buy Bitcoin via a Credit Card or Paypal? - Bitcoin Stack Exchange
How do I put bitcoins in my "Wallet"? - Bitcoin Stack Exchange
How to develop a new blockchain from scratch - Bitcoin Stack Exchange
How can I sell bitcoins and transfer the funds to my bank account? - Bitcoin Stack Exchange
51% attack - apparently very easy? refering to CZ's "rollback btc chain" - How to make sure such corruptible scenario can never happen so easily? cryptocurrency attack - Bitcoin Stack Exchange
Signals intelligence - SIGINT - Intelligence/Information gathering - Wikipedia
Python at Netflix – Netflix TechBlog – Medium
Chinese Media Warn WeChat Group Admins: "You Can Be Arrested for What Happens in Your Group Chat" - Government Surveillance | What's on Weibo
Which VPNs evade the Chinese Great Firewall? government surveillance - We got inside to find out - Comparitech
Electronic identification - eID - RFID - Wikipedia
Microsoft recommends using a separate device for administrative tasks - Microsoft's Security Team publishes basic advice for securing corporate networks | ZDNet
Stay Safe: 5 Tips to Keep Fraudsters at Bay - avoid fraud and scams
This ransomware sneakily infects victims by disguising itself with anti-virus software | ZDNet
The Security Pitfalls of Keeping Your Ports Wide Open
Inside China’s Surveillance Crackdown on Muslim Uyghurs - cyberwarfare | WIRED
Feds Dismantled the Dark-Web Drug Trade—but It's Already Rebuilding | WIRED
Amazon Is Losing the War on Fraudulent Sellers - Schneier on Security
GitHub - Tuhinshubhra/ExtAnalysis: Browser Extension Analysis Framework - browser security
The Different Ways a Data Breach Can Impact Businesses - company wise
Hackers Stole $40 Million From Binance Cryptocurrency Exchange | WIRED
Leaked NSA Hacking Tools - shadow brokers - Schneier on Security
Artificial Intelligence May Not 'Hallucinate' After All - adversarial examples | WIRED
CQTools - The New Ultimate Windows Hacking Toolkit
Malicious Microsoft Office Macro Creator - office macro malware - Schneier on Security
Ongoing Attack Stealing Credit Cards From Over A Hundred Shopping Sites - MageCart group related
Unpatched Flaw in UC Browser Apps Could Let Hackers Launch Phishing Attacks - browser address bar spoofing vulnerability that affects popular Chinese UC Browser and UC Browser Mini apps for Android
Nation state actors, affiliates behind increasing amount of data breaches - Verizon's 2019 Data Breach | ZDNet
How to use advanced rsync for large Linux backups | Opensource.com
Why startups should release their code as open source | Opensource.com
Google Chrome to Introduce Improved Cookie Controls Against Online Tracking - Industrial privacy violations
Baltimore City Shuts Down Most of Its Servers After Ransomware Attack - cyberwarfare
Google Chrome to support same-site cookies, get anti-fingerprinting protection | ZDNet
How to Limit How Long Google Keeps Your Data - privacy, fingerprinting, tracking | WIRED
Freedom Mobile leaked millions of card data with CVV codes in plain text
Chinese hackers accessed NSA hacking tools before Shadow Brokers leak
WordPress finally gets the security features a third of the Internet deserves -support for cryptographically-signed updates, a modern cryptographic library | ZDNet
GitHub - GitHackTools/BruteDum: BruteDum - Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack
The CIA Sets Up Shop on Tor, the Anonymous Internet - hidden service | WIRED
How to secure your iPhone or iPad from hackers, snoopers, and thieves (iOS 12.2) | ZDNet
Russian cyberspies are using one hell of a clever Microsoft Exchange backdoor -Turla APT group found exploiting LightNeuron backdoor, a first of its kind targeting Microsoft Exchange email servers. | ZDNet
TRON critical security flaw could break the entire blockchain | ZDNet
EU Security Bloggers Finalists 2019 Survey - resources
How to verify a self-encrypted drive (SED) is really encrypted? - Super User
SSD encryption vulnerability & TPM -Self-encrypting deception: weaknesses in the encryption of solid state drives (SSDs) -Information Security Stack Exchange
Right way to use the TPM for full disk encryption - LUKS - Information Security Stack Exchange
dm-crypt/Specialties - secure boot - Master Boot Record MBR encryption - Bootloader, BIOS - ArchWiki
dm-crypt/Encrypting an entire system - definitive hands-on comparison - full disk encryption - boot folder, MBR master boot record - LUKS, dm-crypt - btrfs
Full-stack Developer Tips from the Creator of Redux Form | Toptal
RDP vulnerability - Explanation of heap shaping technique and how it is different from heap spraying - Reverse Engineering Stack Exchange
Purpose of test eax,eax after a strcmp - Reverse Engineering Stack Exchange
What is a good Java decompiler and deobfuscator? - Reverse Engineering Stack Exchange
Why is so much ransomware breakable? Fighting Ransomware, solutions - Information Security Stack Exchange
Ssllab.com - How do I know which cipher suites can be disabled? - Information Security Stack Exchange
side-channels attacks - What are the new MDS attacks, and how can they be mitigated? - Information Security Stack Exchange
Information obtained from executing Javascript math functions in browser - JavaScript fingerprinting - Information Security Stack Exchange
Can websites detect if visitors are logged in to mainstream ID providers and collect their IDs? OAuth privacy security - Information Security Stack Exchange
Why WhatsApp Will Never Be Secure – backdoors, WhatsApp proprietary source code, government surveillance - Telegraph
Now hackers can steal your ID and bank details from a coffee machine! | WhatsApp privacy issues - IoT security, smart TVs - Daily Mail Online
FBI asked Durov and developer for Telegram backdoor - Telegram protocol - Neowin
The Crypto-Keepers - definitive stories about Telegram, its founder Dunov, miscellaneous stories about privacy and state surveillance | Yasha Levine
WhatsApp Vulnerability - Schneier on Security
Comparing Messaging Apps - Signal vs Whatsapp - Schneier on Security
Is WhatsApp Hacked? - Schneier on Security
Prices for Zero-Day Exploits Are Rising - vulnerability market - Schneier on Security
NIST is No Longer Recommending Two-Factor Authentication Using SMS - Schneier on Security
The Evolution of Darknets - Schneier on Security
Possible Government Demand for WhatsApp Backdoor - Schneier on Security
A Man-in-the-Middle Attack against a Password Reset System - Schneier on Security
Can the NSA Break AES? side-channels attacks - Schneier on Security
Russian Censorship of Telegram - Schneier on Security
Russia is Banning Telegram - vs WhatsApp vs Signal - Schneier on Security
Essays: Censorship in the Age of Large Cloud Providers - Telegram proprietary protocol issues/concerns- vs Signal vs WhatsApp - Schneier on Security
Why You Should Stop Using Telegram Right Now - vs Signal, iMessage, WhatsApp
Telegram - secure, free messaging, security concerns | Hacker News
Why We Should All Be Using the Encrypted Chat App Signal - definitive private messaging apps comparison- Signal vs WhatsApp vs Telegram ... | WIRED
Essays: Why the FBI Wants You to Reboot Your Router - VPNFilter — and Why That Won’t Be Enough Next Time - Schneier on Security
How Even the FTC's Lead Technologist Can Get Hacked - Identity Theft - Passwords, authentication | WIRED
Hobbling Huawei: Inside the U.S. war on China’s tech giant - 5G security risks - cyberwarfare
Crypt-analysis methods for breaking or finding weakness in an encryption algorithm? cryptanalysis, encryption algorithm identification - Information Security Stack Exchange
Crack Unknown Encryption - cryptanalysis, encryption algorithm identification - Information Security Stack Exchange
Detecting encryption in real-time? cryptanalysis, encryption algorithm identification- Cryptography Stack Exchange
Can I find the encryption key if I know the plain text and the encrypted text (DES and AES)? - Cryptography Stack Exchange
An approach to identifying cryptographic algorithm from ciphertext - cryptanalysis, encryption algorithm identification - IEEE Conference Publication
Practical cryptanalysis, encryption algorithm identification
Is any systematic method that can recognize the encryption algorithm of a cipher text? cryptanalysis, encryption algorithm identification
Cryptanalysis - OWASP
Detecting Objects Using OpenCV and Swift | Toptal
How would one crack a weak but unknown encryption protocol? cryptanalysis, encryption algorithm identification - Cryptography Stack Exchange
Possible ways to crack simple hand ciphers?cryptanalysis, encryption algorithm identification- Cryptography Stack Exchange
How to determine what type of encoding/encryption has been used?cryptanalysis, encryption algorithm identification- hash breaking - md5
The Effects of Iran's Telegram Ban - cyberwarfare - Schneier on Security
How to Secure Your Android Device - WhatsApp vs Signal vs Wire | Restore Privacy
A List of Google privacy respectuous Alternatives You Can Use - The Mac Observer
UnaOS - Private, Reliable and Secure Android Smartphone - privacy respectuous alternative
Reverse RDP Attack: Code Execution on RDP Clients - Check Point Research
X.Org alternatives? MicroXWin, Wayland, Y, DFB, Xynth, Fresco, etc.. / GNU/Linux Discussion / Arch Linux Forums
What conditions does a provable secure cryptosystem satisfy? WPA brokenness - Cryptography Stack Exchange
Provable security - Controversies - cryptosystem - Common Criteria, secure coding, security by design
Prove security of crptographic protocol
Cryptosystem - Wikipedia
Proofs in Cryptography
Introduction to Security Proof of Cryptosystems - provable security
X window Protocol Should Be Stabbed And Burnt - security
What's the rationale behind Ctrl-Alt-Del for login - secure attention key - Information Security Stack Exchange
Linux Secure Authentication Key KAF - Secure Attention Key is a security tool which is provided as protection against trojan/keylogger password capturing/sniffing programs
How does Amazon bill me without the CVC / CVV / CVV2? - credit card information processing and security - Information Security Stack Exchange
How big an RSA key is considered secure today? key length - Cryptography Stack Exchange
FIPS 140-2 Compliant Algorithms - Cryptography Stack Exchange
What are the chances that AES-256 encryption is cracked? strength - Cryptography Stack Exchange
Why does OpenSSL differentiate between PSS and non-PSS for private key generation? - Cryptography Stack Exchange
In Elliptic Curve, what does the point at infinity look like? - Cryptography Stack Exchange
Why is PerfectForwardSecrecy considered OK, when it has same defects as salt-less password hashing? - Cryptography Stack Exchange
Which TLS features are vulnerable to chosen-prefixes collision on SHA-1? - Cryptography Stack Exchange
Web Application Penetration Test Reporting (W48) - Hakin9 - IT Security Magazine
Home | Military & Aerospace Electronics - cyberwarfare
trusted computing test unmanned - drone/unmanned hacking - cyberwarfare| Military & Aerospace Electronics
Iran–U.S. RQ-170 incident has defense industry saying 'never again' to unmanned vehicle hacking - UAV/drone hacking -multi-level encryption and cross-domain solutions | Military & Aerospace Electronics
Israeli trusted computing experts thwarted 2017 Iran cyber warfare attack on country’s missile warning | Military & Aerospace Electronics
Iran claims to have copied U.S. unmanned drone; what's the threat from this captured technology? drone/UAV Hacking - cyberwarfare | Military & Aerospace Electronics
U.S. Navy under cyber attack from Chinese hackers and hemorrhaging national security secrets - cyberwarfare | Military & Aerospace Electronics
Who sees and shoots first wins; Navy demonstrates lesson with surveillance and laser weapons - swarm tactics - cyberwarfare | Military & Aerospace Electronics
Hacker drone story a cautionary tale about the need for unmanned vehicle data security - drone/UAV Hacking, cyberwarfare, Lockheed Martin RQ-170 Sentinel UAV| Military & Aerospace Electronics
Military organizes for cyber warfare - Iran, north Korea | Military & Aerospace Electronics
Raytheon to fix software problems in Air Force cyber security and cryptographic system - cyberwarfare | Military & Aerospace Electronics
The shadowy world of cyber warfare - electronics/SIGINT warfare | Military & Aerospace Electronics
It is time to take anti-tamper technology seriously - cyberwarfare, reverse engineering | Military & Aerospace Electronics
Passive Sonar Target Detection Using Statistical Classifier and Adaptive Threshold[v1] - cyberwarfare | Preprints
c++ - What is the copy-and-swap idiom? rule of three - Stack Overflow
malware - Should one buy new hardware after a system compromise? risk management, BIOS/UEFI, firmware-level - SPI programmer, flashing new BIOS, flash/EEPROM - Information Security Stack Exchange
TI-82 - graphing calculator made by Texas Instruments- Zilog Z80 - TI BASIC - Wikipedia
TI-BASIC - name of a BASIC-like language built into Texas Instruments graphing calculators - Z80 cpu - Wikipedia
Comparison of Texas Instruments graphing calculators - TI-82 - Zilog Z80 CPU - Wikipedia
usb - How can I connect my TI-84 Plus calculator with my laptop? TiLP - libticables - Ask Ubuntu
Texas Instruments TI-82 Teardown - iFixit
What is the difference between a flash drive and a hard disk? - Quora
What's the technical difference between a flash drive and an SSD? definitive comparison - Flash vs SSD based on NAND-based flash memory - Super User
USB flash drive - thumb drive, pen drive, gig stick, flash stick, jump drive, disk key, disk on key - flash-drive, memory stick (not to be confused with the Sony Memory Stick), USB key, USB stick or USB memory -- forensics - vs tape vs floppy disk vs optical media vs flash memory card vs external hard disk HDD - security, encryption - BadUSB, USB Killer - flash memory - NAND - filesystem - Wikipedia
Static random-access memory - SRAM - vs DRAM - Wikipedia
Data recovery on TI-83+ - Texas Instrument - ROM vs Flash vs RAM - Forum
Memory refresh - SRAM/PSRAM, DRAM, DDR SDRAM, eDRAM - Wikipedia
Texas Instrument TI Calculator Data recovery after RAM Cleared -Garbage Collector - Archive Undeleter - Calcsys - Tutoriaux
BACKUP YOUR PROGRESS OFTEN! - Data recovery Texas Instrument TI Calculator after RAM Clears
My Calculator Crashed! Now What? - Data recovery Texas Instrument TI Calculator after RAM Clear - Calcsys, Archive Undeleter - definitive guide
Texas Instruments Calculators - Reference - TI Story Home - TI Story
Texas Instrument TI Calculators - Reference - Welcome - ticalc.org
Texas Instrument TO Calculators- TIGCC : a C compiler for TI9x - Z80 Asm Ide : an IDE to develop Z80 assembly programs - rabbitsign : a TI-83/84 Plus Flash Application signing program - tisdcc : a C compiler for TI8x - TiLP - Welcome to the Linux Programmer Group
GitHub - siraben/zkeme80: An assembler and operating system for the Z80 written in Scheme, Forth and assembly.
intel - Could anything with a Z80 processor run Gameboy games? The Z-80 instruction set is a superset of the 8080 instruction set - Stack Overflow
Code Size Information with gcc for ARM/Kinetis - arm-none-eabi-size | MCU on Eclipse
Integrated circuit - IC abbreviation - Wikipedia
Global AppSec Tel Aviv 2019: An Introduction to Hacking Blockchain Applications and smart contracts
Application security - appsec - SAST/DAST/IAST
DevSecOps - Application Security Wiki
How to Defeat Full-Disk Encryption in One Minute | Threatpost
AES instruction set - Inetl AES-NI New Instructions - mitigate side-channels attacks - Wikipedia
How to Set and Unset Local, User and System Wide Environment Variables in Linux - .bashrc, .bash_profile, .bash_login, .profile files - /etc/environment, /etc/profile, /etc/profile.d/, /etc/bash.bashrc
Ahead-of-time compilation - AOT - byte-code to native code compilation - Wikipedia
ProtonVPN: In-Depth Testing & Review 2019 (Still Not Recommended)
Best VPN for Netflix: Only These 5 STILL Work! (Tested May 2019)
Outline VPN - Shadowsocks - Encryption IETF ChaCha20 stream cipher (256-bit key) - Self-hosted - Wikipedia
Self-hosting (web services) - Wikipedia
9 Interesting Ways to Watch Cyberattack in Real-time Worldwide - digitalmap-like services - wordfence WordPress security plugin thwarting DDOS attacks
vpn - Tor Exit Node Security & https website - MitM, self-signed certificates, certificate pinning, Downgrade attacks - VPN Tor combination - - Information Security Stack Exchange
OSCE and Me - CTP Course · OJ Reeves
Smurf attack - DDOS Attack type base on ICMP packets - Wikipedia
Ping of death - Sending malformed/malicious ping packets to trigger buffer overflow/code injection - MTU 1500 bytes - IP Fragmentation, Fragment Offset field in IP header - Wikipedia
Charts - mathematical formulas display  |  Google Developers
ubuntu 18.04 - Remove UEFI password - Firmware flashing meaning - Flash memory/CMOS - Super User
CMOS - Complementary metal–oxide–semiconductor - Wikipedia
AVR microcontrollers - Atmel - Wikipedia
Implementing the DevSecOps Process | Coveros Blog
Understanding DevSecOps | Ranorex Blog
Getting started with policy-driven development and DevSecOps | Puppet
10 Books Every DevSecOps Enthusiast Must Read - DevSecCon | DevSecOps Conferences and Training Courses
DevSecOps‐The 道 of Security Science
How to recover or set a BIOS or UEFI Password for Windows computers
Raspberry Pi - firmware - CPU/GPU - NASA Open-Source Rover - Wikipedia
Raspberry Pi 3 Model B+: A cheat sheet - specifications - TechRepublic
UAE orchestrated hacking of Qatari government sites, sparking regional upheaval, according to U.S. intelligence officials - cyberwarfare - The Washington Post
How secure is OPAL 2.0? - Information Security Stack Exchange
Opal Storage Specification - OPAL 2.0 - Wikipedia
How cryptographic hardware accelerator is secure? Crypto Hardware Accelerators (AES, SHA, PKA, RNG)- cold boot memory attack , memory attacks - Information Security Stack Exchange
How can a user defeat anti-live forensics software? PCIe bus mastering, cold boot attack, TRESOR DMA attack mitigation kernel patch - definitive breakdown - Information Security Stack Exchange
Bluetooth's Complexity Has Become a Security Risk | WIRED
Yes, there are security ramifications to serverless computing | ZDNet
GitHub - CiKu370/OSIF: Open Source Information Facebook is an accurate facebook account information gathering, all sensitive information can be easily gathered even though the target converts all of its privacy to (only me), Sensitive information about residence, date of birth, occupation, phone number and email address.
3 Mirrorless Cameras Tested: Canon EOS R, Sony A7III, Nikon Z6 - camera choice | WIRED
Are there any other CPU manufacturers besides AMD and Intel? CPU market shares
Question - Quora
mlocate -Merging Locate) is a more secure version of the locate utility, that only shows files accessible to the user. - ArchWiki
init - systemd - ArchWiki
fstab - systemd - ArchWiki
DuckDuckGo Doesn't Hide or Encrypt Your Search History [Updated] - weaknesses - Search Encrypt Blog
Why would someone trust DuckDuckGo or other providers with a similar privacy policy? - Information Security Stack Exchange
6 Things You Should Know About 'Anti-Google' Search Engine DuckDuckGo
DuckDuckGo: what is it and how does it work? | WIRED UK
Ether Rag: Duck Duck Go: Illusion of Privacy - government state surveillance
Total Memory Encryption (TME) is a planned x86 instruction set extension proposed by Intel for a full physical memory encryption for DRAM and NVRAM with a single ephemeral key. TME can be further extended with the Multi-Key Total Memory Encryption (MKTME) extension which builds on TME and adds support multiple encryption keys. - BIOS/firmware level
Secure Memory Encryption (SME) is an x86 instruction set extension introduced by AMD for page-granular memory encryption support using a single ephemeral key. A subset of SME, Transparent SME (TSME), is a more limited form of SME used to transparently encrypt the full physical memory. Secure Encrypted Virtualization (SEV) extends SME to AMD-V, allowing individual VMs to run SME using their own secure keys. - key management
Cold boot attack - Digital forensics - Malicious Intent-Circumventing FDE full disk encryption- Bitlocker - Mitigations : Register-based key storage - Cache-based key storage - Ineffective countermeasures- Effective countermeasures - Physical access - Full memory encryption - Secure erasure of memory - Wikipedia
From random block corruption to privilege escalation: A filesystem attack vector for rowhammer-like attacks
Rowhammer RAM attack adapted to hit flash storage • The Register
'Rowhammer' attack flips bits in memory to root Linux - Google crocks capacitors and deviates DRAM to take control of the kernel • The Register
Project Zero: Exploiting the DRAM rowhammer bug to gain kernel privileges - privilege escalation
Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors - Rowhammer paper
Storage Work Group Storage Security Subsystem Class: Opal specifications - defintive | Trusted Computing Group
How the locate command works (and let's write a faster version in one minute!) - command implementation - Julia Evans
BIOS Master Password Generator for Laptops - password recovery /hacking
How to Spring Clean Your Digital Clutter to Protect Yourself - secure deletion/erasure - physical destruction/shredding | WIRED
885 Million First American Financial Records Exposed Online | WIRED
Best Command-Line FTP Clients for Linux
Cyber security 101: Protect your privacy from hackers, spies, and the government - overall privacy encryption measures | ZDNet
Software release life cycle - Alpha release, Beta release, Feature complete - Wikipedia
Intel CPUs impacted by new Zombieload side-channel attack - Microarchitectural Data Sampling MDS attacks | ZDNet
Linux vs. Zombieload | ZDNet
Fending off Zombieload attacks will crush your performance | ZDNet
Windows 10 zero-day exploit code released online | ZDNet
Google Has Stored Some Passwords in Plaintext Since 2005 | WIRED
How to advance your career by contributing to open source projects | Opensource.com
Fingerprinting iPhones - Schneier on Security
Google says it stored some G Suite passwords in plain text for 14 years
Visiting the NSA - Insights about collaboration between security experts and spy/SigInt agencies - Schneier on Security
Startpage.com now lets you search *and* surf in privacy. Here's how the new "Anonymous View" proxy works. - privacytoolsIO
Startpage.com Anonymous View proxy allows you to surf the web anonymously - update - privacy
Device fingerprint - machine fingerprint, browser fingerprint - Wikipedia
Is there any actual proof that Startpage is shady? - privacy
Do you find duckduckgo as good as Google search? vs startpage - privacytoolsIO
Startpage.com has a new "Anonymous View" proxy feature. After you search in privacy, you can view websites anonymously, too. Here's how it works. - privacy
Does Startpage still support Google? - privacytoolsIO
Why is DuckDuckGo more popular than Startpage? vs searx, installation guide searx - privacytoolsIO
Apache Solr - open-source enterprise-search platform, powered by Lucene library - local search engine, knowledge management system
Apache Lucene - Information Retrieval Library - Wikipedia
Web crawler VS Search engine - definitive answer, breakdown of search engine into subparts, one of which is a web crawler - Quora
Web crawler - spider, spiderbot - Internet bot - Wikipedia
Network interface/Data Link layer security - Layer 2 in OSI Model - Content Address Memory CAM table exhaustion attack - Address Routing Protocol ARP spoofing - DHCP starvation, ACL - Hidden Node Attack - De-authentication attack
DHCP Starvation Attack with DHCP Rogue Server | Lucideus Research
layer2 Network Interface/Data Link attacks and mitigations - VLAN Hopping - MAC Attacks - DHCP Attacks - ARP Attacks - Spoofing Attacks - General Attacks
Tutoriel : Apprenez à programmer en TI-Basic ! TI-83 - definitive Language Syntax and semantics guide - prime factorization TI-BASIC Calculator -
TI-Planet | Programmes, Tutoriaux - - Forum TI calculators
prime factorization TI-BASIC Calculator - Décomposition en facteurs premiers programmes - Decomposition en facteurs premiers programmes.pdf
BASIC - Wikipedia
Is integer factorization an NP-complete problem? prime factorization - NP vs co-NP - Theoretical Computer Science Stack Exchange
General number field sieve - most efficient classical algorithm known for factoring integers larger than 10 to the power 100
have i been pwned - Is using haveibeenpwned to validate password strength rational? - Information Security Stack Exchange
Practical Cryptography
A Breakdown and Analysis of the December, 2014 Sony Hack
Script kiddie - Wikipedia
IP fragmentation attack - evasion - full proxy mode - Wikipedia
Character Generator Protocol - security - UDP CHARGEN abused in amplification reflection DDOS attack - TCP/UDP port 19 - RFC 864 - inetd/xinted daemons - Wikipedia
Reflection attack - Wikipedia
ddos - dns reflection attack vs dns amplification attack - Information Security Stack Exchange
Krebs on Security
Inside the infamous Mirai IoT Botnet: A Retrospective Analysis - definitive in depths analysis - krebs on security attack - OVH hosting of Wikileaks - Anna Senpai
Mirai IoT Botnet Co-Authors Plead Guilty - Anna Senpai — Krebs on Security
Who is Anna-Senpai, the Mirai Worm Author? — Krebs on Security
A few stories about Brian Krebs: The independent cybercrime journalist who exposes criminals on the internet - definitive article abour Brian Krebs : internetdrama
KrebsOnSecurity moves to Project Shield for protection against DDoS attack censorship after Mirai attack | CSO Online
The Democratization of Censorship - aftermath of Mirai attack - Project Shield — Krebs on Security
After Meltdown and Spectre, Another Scary Chip Flaw Emerges - speculative speculation | WIRED
Uniform Resource Locators (URL) syntax
Apache Nutch - Definitive method on How to verify PGP Signature - SHA/MD5 integrity checksum
Moving/Copying your PGP Keys
How to verify an imported GPG key - PGP Key trust - gpg: WARNING: This key is not certified with a trusted signature! There is no indication that the signature belongs to the owner.
Validating other keys on your public keyring - PGP Key Trust - Web of Trust
Public-key cryptography - PKI Public Key Infrastructure - Non-repudiation - Brute force key search attack - side channels attacks - Wikipedia
Public key fingerprint/thumbprint - preimage attacks, collision attack
PGP word list - biometric fingerprint - Wikipedia
What is a SSH key fingerprint and how is it generated? MitM - /etc/ssh/ssh_host_rsa_key.pub
browser - Why do file URLs start with 3 slashes? syntax - Super User
Hamza Bendelladj/BX1/Smiling Hacker - RimiG33k virus, SpyEye - Wikipedia
Hamza Bendelladj: Is the Algerian hacker a hero? - BX1 | News | Al Jazeera
Notorious International Computer Hackers Sentenced - Bx1, Aleksandr Andreevich Panin - SpyEye banking virus — FBI
Honeypot, a tool to know your enemy | INCIBE-CERT
Visualizing ATT&CK - definitive visualization of techniques/tactics links – MITRE ATT&CK™ – Medium
IDMS - Integrated Databse Management System - network model (CODASYL) database management system for mainframes
Stateful firewall - Checkpoint - Application Firewall
Is the Intel Management Engine a backdoor? - TechRepublic
Spectre and Meltdown Attacks against Microprocessors - Schneier on Security
The Effects of the Spectre and Meltdown Vulnerabilities - Schneier on Security
Botched RNG in Intel processors, a threat to key creation? : crypto
backdoors in hardware (ie. intel/amd cpu) possible? - Information Security Stack Exchange
How To Detect If Your Cell Phone Is Being Wiretapped? Quick DIY Guide
How to Tell If Your Phone Is Tapped
Listen Up: 17 Signs That You Are Being Wiretapped
Is the Federal Government Tapping Your Phone? | Criminal Lawyers
Yahoo fait désormais partie d’Oath
How Would You Know If your Mobile or Landline Is Tapped?
How to Tell if Your Phone Is Tapped (with Pictures) - wikiHow
How to Know If Your Device Is Being Tapped by Police?
How to know if your home is wiretapped - Quora
How to Know If a Landline Phone Is Tapped? | It Still Works
Is someone listening to your phone calls? How secure is your mobile phone? - Geekaphone Blog
3 Ways to Check if You Are Under Surveillance - wikiHow
How to know if my phone is tapped - Quora
DIY Wiretapping: The Ultimate Guide (and How to Fight Back)
How to Tell If Your Security Camera Has Been Hacked - Reolink Blog
Is it possible to tell if my phone line is being used illegally? | HowStuffWorks
topspying.com | 504: Gateway time-out
sign in with google or facebook security at DuckDuckGo
How "private" is Google Authenticator? : privacy
Signing Into Websites With Google, Facebook is Good for Security | PCMag.com
Is It Safe to Log in with Facebook or Google? | AVG
​What are you sharing when you sign in with Facebook or Google? - CBS News
Should You Use Facebook or Google to Log In to Other Sites? - Techlicious
mac filesystem at DuckDuckGo
Telephone tapping - Wikipedia
Phrack - Hackers ezine - magazine - Wikipedia
Alice and Bob - fictional characters commonly used as placeholder names in cryptology, as well as science and engineering literature - Wikipedia
tcp - I have found ports on my Samsung smart tv running a display service. What can I do with it? Operating System Tizen OS - Nmap - Information Security Stack Exchange
virus - Dualbooting Windows and Ubuntu, can I get Windows viruses/malware while running Ubuntu? cross-platform malware - ABI - Windows INT 20h, Linux INT80h - Information Security Stack Exchange
Syslinux Wiki - The Syslinux Project covers lightweight bootloaders for MS-DOS FAT filesystems (SYSLINUX), network booting (PXELINUX), bootable "El Torito" CD-ROMs (ISOLINUX), and Linux ext2/ext3/ext4 or btrfs filesystems (EXTLINUX). The project also includes MEMDISK, a tool to boot legacy operating systems (such as DOS) from nontraditional media; it is usually used in conjunction with PXELINUX and ISOLINUX.
Hyperjacking - Attacks on hypervisor - Wikipedia
Cross-platform software - multi-platform software or platform-independent software - Hardware (ISAs) VS Software (OSs, Programming Environment) platforms - JVM, Java processor, bytecode, CLI - Wikipedia
Java (software platform) - security - available IA-32, x64, ARMv7, ARMv8, SPARC - Wikipedia
Computing platform - cross platform - hardware, software, virtual envionment - Wikipedia
Java processor - hardware implementation of the JVM, mostly for embedded systems - Wikipedia
2600: The Hacker Quarterly - hacking magazine - Wikipedia
Zone-H.org - Unrestricted information - Defaced websites - cyberwarfare news
Zone-H - deface websites archive - Wikipedia
Website defacement - attack - Wikipedia
HackThisSite - HTS - hackable target - Wikipedia
List of digital forensics tools - Kali Linux like systems and tools - Wikipedia
Hacking of consumer electronics - jailbreaking, rooting - smartphones, video game systems - Wikipedia
network - Landlord will be watching my data traffic, as mentioned in the lease agreement - surveillance - VPN, HTTPS, Mobile data/network 4G/LTE - Information Security Stack Exchange
Conjugate transpose - Hermitian transpose - Wikipedia
TCP reset attack - a.k.a forged TCP resets, spoofed TCP reset packets - Mitigation, IPSec
Analyzing the Great Firewall of China Over Space and Time - 2015 - SYN scans, TCP backlog - Tor - government surveillance
HTTP cookie - aka web cookie, Internet cookie, browser cookie, or simply cookie - stateful information
coding style - Where did the notion of "one return only" come from? - Software Engineering Stack Exchange
Religious War #48,293: Single Vs. Multiple Returns - Abby Fichtner
Why Many Return Statements Are a Bad Idea in OOP
Java Basics: Commentary: Return statements and the single exit fantasy
Coding Tip: Have A Single Exit Point — Tom Dalling
Return early and clearly - Simplify C++!
Early exit – NCR Edinburgh – Medium
Single Function Exit Point
coding style - Why should a function have only one exit-point? - Stack Overflow
What are the disadvantages of single entry single exit programming? - Quora
Question about functions exit points : C_Programming
Wide char and library functions in C++ - wchar_t- GeeksforGeeks
Caret notation - for control characters in ASCII
Control character - Wikipedia
Terraform (software) - Infrastructure as Code - alternative to Chef, Puppet - Wikipedia
Ethereum vs Bitcoin: What are the Differences?
Proof of stake - PoS - Wikipedia
Project Zero: Reading privileged memory with a side-channel - speculative execution
List of multinational companies with research and development centres in Israel -
Function Attributes - Using the GNU Compiler Collection (GCC) - __attribute__
C++ functions attributes - Microsoft __declspec - GCC __attribute__
Function attributes in C and C++ - definitive - __attribute__
Using the GNU Compiler Collection (GCC): Attribute Syntax
syntax - What does double underscore ( __const) mean in C? symbols reserved for implementation
The syntax of C in Backus-Naur form - Grammar
definitive TI-83 GRAPHING CALCULATOR GUIDEBOOK
Safely Storing User Passwords: Hashing vs Encrypting - Salts - PBKDF2, bcrypt, and scrypt
system password vs administrator password in BIOS settings - Super User
Stunnel - open-source multi-platform application used to provide a universal TLS/SSL tunneling service - If linked against libwrap, it can be configured to act as a proxy–firewall service as well
Could a blockchain really prevent malware in the Internet of Things? blockchains benefits and limitations in IoT security - big data management, micro-transactions, transparency - Bitcoin, ethereum, Proof of Work, Mining, cost - Internet of Things Stack Exchange
Why would IPv6 be necessary for the IoT? IPv4 vs IPv6 - NAT, Carrier Grade NAT CGNAT, DNAT - Internet of Things Stack Exchange
When and why to use MQTT protocol? - Internet of Things Stack Exchange
Comparative power requirements of various wireless networking protocols - How to choose the right wireless protocol application - Internet of Things Stack Exchange
5 Best VPN Services for Torrenting: Fast, Secure, and No IP Leaks!
Quantum channel representation of projective measurement - scalar product, orthogonal projection - Quantum Computing Stack Exchange
Is there a general method of expressing optimization problem as a Hamiltonian? graphs - Quantum Computing Stack Exchange
Question on state distinguishability - probability - Quantum Computing Stack Exchange
What is the definition of Bell state on a n-qubit system? - Quantum Computing Stack Exchange
How Technology and Politics Are Changing Spycraft - cyberwarfare, cryptography - Schneier on Security
Cybersecurity: How a layered approach keeps this F1 team's data secure | ZDNet
We Are Tenants on Our Own Devices - free software, industrial corporate surveillance, customer freedom | WIRED
Google uses Gmail to track everything you buy online | ZDNet
Paranoia will destroy us: Why Huawei and other Chinese tech is not spying on Americans | ZDNet
NASA Astrobee is a free-flying robot that is designed to operate as a payload inside the International Space Station (ISS). The Astrobee Robot Software consists of embedded (on-board) software, supporting tools and a simulator. The Astrobee Robot Software operates on Astrobee's three internal single board computers and uses the open-source Robot Operating System (ROS) framework as message-passing middleware.
Students from Stanford's Robotics Club Releases Open-Source Robo-Dog Online - Building a Robot from the Ground Up
Hackers are scanning for MySQL servers to deploy GandCrab ransomware | ZDNet
GitHub - ipfinder-io/ip-finder-cli: The official command line client for IPFinder
Germany Talking about Banning End-to-End Encryption - government state surveillance - encryption ban- Schneier on Security
Snapchat internal tools abused to spy on users and pillage data - user privacy violations, corporate surveillance | ZDNet
Windows 10 to warn about insecure WiFi networks using WEP or TKIP | ZDNet
Equifax rating outlook decimated over cybersecurity breach | ZDNet
GitHub - anouarbensaad/vulnx: Vulnx 🕷️ CMS and vulnerabilites Scanner/detector, & An intelligent bot auto shell injector
Choosing the right model for maintaining and enhancing your IoT project | Opensource.com
Dual booting Windows and Linux using UEFI - vs BIOS - secure boot - GPT vs MBR | Opensource.com
The Latest Julian Assange Indictment Is an Assault on Press Freedom - government surveillance - whistleblowing | WIRED
Nord VPN review: An in-depth look at a popular VPN | ZDNet
German SG-41 Encryption Machine Up for Auction - cyberwarfare - world war two, German vs allies military technology - Schneier on Security
Thangrycat: A Serious Cisco Vulnerability - trusted computing, architecture model - FPGA - Schneier on Security
Tor Anonymity: Things NOT To Do While Using Tor
Download official version of Tor browser on Android devices
GitHub - EternalC0der/TeleShadow3: TeleShadow - Telegram Messaging Desktop Session Stealer (Windows) - hack, sniff
UK says it warned 16 NATO allies of Russian hacking activities - cyberwarfare | ZDNet
London Underground to begin tracking passengers through Wi-Fi hotspots - government surveillance and tracking | ZDNet
Install OpenNMS Network Monitoring Tool in CentOS/RHEL 7
Run your blog on GitHub Pages with Python | Opensource.com
Hardware bootstrapping with Ansible | Opensource.com
US to reportedly blacklist Chinese surveillance camera giant Hikvision - cyberwarfare, spying, espionnage | ZDNet
7 steps large companies are taking to safeguard against cybercrime - company wise
Facial Recognition Has Already Reached Its Breaking Point - risks, mass surveillance | WIRED
Two more Microsoft zero-days uploaded on GitHub - SandboxEscaper| ZDNet
GitHub - CoolerVoid/HiddenWall: Linux kernel module generator for custom rules with netfilter. (block ports, Hidden mode, rootkit functions etc). Second layer firewall - iptables
Snapchat Employees Reportedly Spied on Private Snaps - privacy violations | WIRED
GitHub - rndinfosecguy/Scavenger: Crawler (Bot) searching for credential leaks on different paste sites.
Google services to continue working on existing Huawei Android devices - cyberwarfare | ZDNet
How to Setup Secure Private Chat Server with Ytalk over SSH
Comparison of network monitoring systems - zabbix, nagios, opennms- Wikipedia
Just how big is Big Data? Facebook, Google, Apple siri - corporate surveillance, privacy violations
Firefox to collaborate with HaveIBeenPwned to alert users on data breach
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs - hack air gapped computer - side channel attack, signal analysis
Hackers To Demonstrate How To Hack An Offline Laptop - air gapped computers
Russian Hackers Responsible for Widespread Power Outage in Ukraine? power grid hacking
Ukraine Airport’s Computer Networks Infected with Malware - cyberwarfare
Dark Tequila is a sophisticated banking malware targeting victims in Mexico - USB drive infection - keylogger, network monitoring tool
Mydoom - W32.MyDoom@mm, Novarg, Mimail.R and Shimgapi, is a computer worm affecting Microsoft Windows. It was first sighted on January 26, 2004. - Wikipedia
ILOVEYOU - sometimes referred to as Love Bug or Love Letter, is a computer worm that attacked tens of millions of Windows personal computers on and after 5 May 2000- Wikipedia
Top Ten Most-Destructive Computer Viruses | Page 2 | Science | Smithsonian
Hackers can steal data from Air-Gapped PCs with microphones & speakers
How to Create and Manage Cron Jobs on Linux
Some Elasticsearch security features are now free for everyone - Company makes TLS support and fine-grained user/role management free for everyone.| ZDNet
Root account misconfigurations found in 20% of top 1,000 Docker containers - security | ZDNet
Set up a static network connection in Linux | Opensource.com
Gmail wittingly storing your online purchase data for years - privacy violations
Is android tor as anonymous as desktop tor? Android privacy - OS or hardware level spying, windows, chip with Intel ME / AMD PSP - TOR
Is 'tor browser for android' which is available in playstore safe ? - TOR
w3m - w3m is a free software/open source text-based web browser and terminal pager. - Wikipedia
Please stop recommending Orfox for Android when Tor Browser Alpha has been here since September - TOR
Orfox vs Tor Browser vs Firefox for Android FAQ
Political Parties Still Have Cybersecurity Hygiene Problems - cyberwarfare | WIRED
Google research: Most hacker-for-hire services are frauds | ZDNet
Secure an Android Device - Android software stack  |  Android Open Source Project
Why Choosing Between Android and iOS Still Matters - privacy, compatibility
7 Open Source Mobile OS Alternatives To Android in 2019
Backdoor evidence suggests Huawei deserves to lose network empire - MSPoweruser
Recovering TI-82 Calculator Deleted RAM - Texas Instrument - yAronet
Why do C to Z80 compilers produce poor code? z80 assembly - addressing mode - Retrocomputing Stack Exchange
Introduction to Z80 Assembler
Category: Zikog Z80 Assembly - Rosetta Code
Z80 Assembler Reference - syntax basics - code examples · Dotneteer/spectnetide Wiki · GitHub
Z80 Assembler Syntax - code examples
Z80-Family CPUs - definitive reference page - architecture, assembly syntax
Assembler for Dummies (Z80) - syntax, code examples - MSX Wiki
z88dk - z80 development kit - z80 C cross compiler supplied with an assembler/linker and a set of libraries implementing the C standard library for a number of different z80 based machines. · GitHub
Pentest Lab Setup on Memcached
Jenkins Hacking Pentest Lab Setup
Top-Tier Russian Hacking Collective Claims Breaches of Three Major Anti-Virus Companies - fxmsp hacking group
A journey towards practical fully homomorphic encryption
Is Open Source Software More Secure
How a CPU Works - YouTube
How does your mobile phone work? - YouTube
YouTube
YouTube
microcontroller vs. System on chip - programmable
Difference between an a microcontroller and a system on a chip? Flash - Computer Science Stack Exchange
Question - Quora
FPGAs, SoCs, Microcontrollers— A Quick Rundown of IoT Devices
System on a chip - Raspberry Pi
Know About Difference Between Microcontroller and Microprocessor
Microcontroller vs Microprocessor | AVR Tutorials
Raspberry Pi hardware specs - Raspberry Pi Documentation
Question - Quora
Arduino vs. Raspberry Pi: Which Board Is Best? cpu vs mcu
Raspberry Pi or Arduino Uno? One Simple Rule to Choose the Right Board.M - CPU vs MCU
Chip vs printed circuit board - Electrical Engineering Stack Exchange
Printed Board Circuit vs Integrated Circuit vs Chip vs Op Amp
Is the Raspberry Pi a microcontroller or a motherboard? - Electrical Engineering Stack Exchange
Difference between AVR, ARM, 8051 and PIC Microcontrollers - MCU definition
difference between arm and other microcontroller
How To Choose A Microcontroller - Octopart
What is a Raspberry Pi? | Opensource.com
Using the Raspberry Pi as a microcontroller | Opensource.com
The Difference Between A Microcontroller And A Raspberry Pi - single bord computers - Kompulsa
The SBC (Single Board Computer) vs. motherboards - Sparton Rugged Electronics
What are the major differences between an SBC (single board computer) and SoC (system on chip)?
Single-board computer - SBC - Wikipedia
Difference Between SOC (System on Chip) and Single Board Computer SBC
System-on-Chip vs Single-Board Computer: A Comparison Guide
Arduino and Raspberry Pi: using a microcontroller in your projects - The MagPi MagazineThe MagPi Magazine
Under The Raspberry Pi CPU: The Actual Soc / CPU - YouTube
microcontrollers vs microprocessors what's the difference - definitive explanatory figure
What is the difference between a microprocessor and microcontroller?
Integrated circuit - Monolithic Integrated Circuit - IC, Chip, Microchip - Wikipedia
When do I call it CPU and when IC-Chip? - Electrical Engineering Stack Exchange
Creating a Cybersecure Home - privacy, IoT/smart home security | SANS Security Awareness
Single-board microcontroller - Wikipedia
Arduino - opti-boot bootloader
GitHub - mame82/P4wnP1_aloa: P4wnP1 A.L.O.A. by MaMe82 is a framework which turns a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming and physical engagements ... or into "A Little Offensive Appliance".
Baltimore city ransomware attack is powered by stolen NSA hacking tool - eternal blue
What to do if your email is found on the Dark Web - haveibeenpwned
Troy Hunt: 8 million GitHub profiles were leaked from GeekedIn's MongoDB - here's how to see yours - haveibeenpwned
Nearly 1 Million Computers Still Vulnerable to "Wormable" BlueKeep RDP Flaw
To Fight Deepfakes, Researchers Built a Smarter Camera | WIRED
Gating production in DevOps | Opensource.com
An Open-Source (and Cute) Alternative to Amazon Echo - personal voice-enabled assistant - MIT Technology Review
How to build your own Alexa-like personal voice-based assistant | InfoWorld
Build your first Voice based personal Assistant – Towards Data Science
How to Build Your Own voice based personal AI Assistant Using Api.ai -speech-to-text, natural language processing, artificially intelligent systems that you can train up with your own custom functionality. — SitePoint
Snips lets you build your own voice based personal ai assistant to embed into your devices - | TechCrunch
Mycroft – Open Source Voice personal Assistant - Mycroft
Create your own Voice based assistant application using Python
Mueller's Bottom Line: Indicting Trump Wasn't Even an Option - cyberwarfare | WIRED
Security News This Week: A Teen Waltzed Into Mar-a-Lago - cyberwarfare, keepblue | WIRED
GitHub - OWASP/Amass: In-depth DNS Enumeration and Network Mapping
Apple and WhatsApp fight proposal to let spies tap encrypted comms - GCHQ - government surveillance | ZDNet
Government Communications Headquarters - GCHQ - government spy agency - cyberwarfare - Wikipedia
What is the difference between the UK intelligence services GCHQ, MI5, MI6 and the police
ProtonMail denies that it offers real-time surveillance assistance - weaknesses, concerns
I2P network proposed as the next hiding spot for criminal operations - hidden service, tor | ZDNet
Google Is Finally Making Chrome Extensions More Secure | WIRED
Russian military moves closer to replacing Windows with Astra Linux - Cyberwarfare, Chinese custom OS | ZDNet
Metabigor allows you do query from command line to awesome Search Engines (like Shodan, Censys, Fofa, etc) without any API key - GitHub
Linux Uptime Command With Usage Examples
Microsoft's BlueKeep Bug Isn't Getting Patched Fast Enough | WIRED
Microsoft issues second warning about patching BlueKeep as PoC code goes public | ZDNet
Simplifying C++ - CppCast
Best Cyber Security Certifications 2019
New attack creates ghost taps on modern Android smartphones - Academics abuse NFC-enabled devices with capacitive touchscreens to induce fake screen taps | ZDNet
An introduction to the historical evolution of programming practices - system virtual machine vs process virtual machine | Opensource.com
Does C++ use AOT or JIT compilation? JIT with WebAssembly byte-code
Why is it hard to beat AOT compiler with a JIT compiler (in terms of app. performance)? - Stack Overflow
Why is Java faster when using a JIT vs. AOT compiling to machine code? - Stack Overflow
GitHub - fr0gger/vthunting: Vthunting is a tiny script used to generate report about Virus Total hunting and send it by email, slack or telegram.
C code always runs way faster than Java, right? Wrong! | Java Code Geeks - 2019
Java performance - Wikipedia
Question - Quora
What backs up the claim that C++ can be faster than a JVM or CLR with JIT? - Software Engineering Stack Exchange
Why would it ever be possible for Java to be faster than C++? - Software Engineering Stack Exchange
when is java faster than c++ (or when is JIT faster then precompiled)? - Stack Overflow
JIT compiler vs offline compilers - Stack Overflow
Demystifying the JVM: Interpretation, JIT and AOT Compilation
Performance Improvements via JIT Optimization – Malith Jayasinghe – Medium
Understanding JIT compiler (just-in-time compiler)
GitHub - hc0d3r/sshd-poison: a tool to get creds of pam based sshd authentication - pluggable authentication module
GitHub - Tuhinshubhra/CMSeeK: CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 170 other CMSs
4 Best Password Managers of 2019 (Paid, Family, and Free) | WIRED
Intense scanning activity detected for BlueKeep RDP flaw | ZDNet
How to write a good C main function - _start function | Opensource.com
All the Ways Google Tracks You—And How to Stop It | WIRED
Question - Quora
The Insecurity of Secret IT Systems - security through obscurity, voting machines, quantum key cryptography - Schneier on Security
Secrecy, Security through Obscurity
Essays: The Process of Security - Schneier on Security
How to Remain Secure Against the NSA - defintive tips to overall privacy - government surveillance - snowden - Schneier on Security
The FAA Is Arguing for Security by Obscurity - Schneier on Security
Companies Handing Source Code Over to Governments - backdoors for government surveillance - NSA - Schneier on Security
Distributing Malware By Becoming an Admin on an Open-Source Project - Schneier on Security
Open-Source Software Feels Insecure - Schneier on Security
Network Scanning using NMAP (Beginner Guide)
Freedome VPN review: A good VPN backed by a well-known security company | Macworld
A proposed API for full-memory encryption [LWN.net]
Embedded Machine Learning on 8-Bit Microcontrollers, Including Arduino
Is it possible to crack a PIN / PUK code on a phone SIM card? - Information Security Stack Exchange
How to Bypass Virtually Every News Paywall – Black Edge Consulting – Medium
Israeli F-16s Wiped Out a Syrian Missile Complex (Russian Didn’t Fire Back) - cyberwarfare | The National Interest
New Iranian hacking tool leaked on Telegram - hacking groups | ZDNet
The FBI's most wanted cybercriminals | ZDNet
US to demand five years of your social media, email account info in visa application - government surveillance | ZDNet
The Importance of Protecting Cybersecurity Whistleblowers - Schneier on Security
Wave of SIM swapping attacks hit US cryptocurrency users | ZDNet
GitHub - Srinivas11789/PcapXray: PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction
How to Install and Configure VNC Server on Ubuntu
Another MacOS Bug Lets Hackers Invisibly Click Security Prompts | WIRED
Understanding the Failure of U.S. Foreign Policy: The Albright Doctrine - warfare | The National Interest
What are the practical differences between 256-bit, 192-bit, and 128-bit AES encryption? grover's algorithm,
Taking advantage of one-time pad key reuse? - Cryptography Stack Exchange
Is the software that uses PGP broken, or is it PGP itself? vulnerability., OpenPGP, S/MIME- Cryptography Stack Exchange
If WhatsApp cannot read our message, how can the media forwarding happen in an instant? - Cryptography Stack Exchange
What is the link, if any, between Zero Knowledge Proof (ZKP) and Homomorphic encryption? - Cryptography Stack Exchange
Is this paper's technique for factoring RSA 2048 with noisy qubits realistic? RSA breaking, quantum computing - Cryptography Stack Exchange
How long does it take to crack RSA 1024 with a PC? brute force - Cryptography Stack Exchange
How to explain zero proof protocol to your children
Is a hash a zero-knowledge proof? - Cryptography Stack Exchange
Is there a big jump between prototyping on a Pi, and using a microcontroller? raspberry - Internet of Things Stack Exchange
Z-Wave - wireless communications protocol used primarily for home automation. It is a mesh network using low-energy radio waves to communicate from appliance to appliance - Wikipedia
SmartHome - Smart Home Products | Home Automation Australia
What options are available for directly buying Monero with fiat currency? anonymous payment - Monero Stack Exchange
How does Monero privacy and security compare to Zcash? - Monero Stack Exchange
How can I anonymize my SSH traffic using the Tor network? - Tor Stack Exchange
What happens if I buy Bitcoins and the price goes down? cryptocurrency trade basics - Bitcoin Stack Exchange
What is the safest bitcoin wallet? security - Bitcoin Stack Exchange
What are the 3 arguments called in function SHA256? void sha256(struct sha256 *sha, const void *p, size_t size)- Bitcoin Stack Exchange
How do Bitcoin clients find each other? DNS seed - Bitcoin Stack Exchange
Enterprise IT shouldn't blame open source for their own poor security practices - TechRepublic
3 Reasons Why Open Source Software is More Secure than Commercial Software. An Opinion.
How can we make open-source software (OSS) more secure?
CLIP OS – Open Source secured operating system - cyberwarfare, french agencies - hardened | Agence nationale de la sécurité des systèmes d'information
CLIP OS - security enhanced Linux OS -CLIP OS is based on the Hardened Gentoo variant of Gentoo Linux - Wikipedia
Is Open Source Software More Secure than Proprietary Products?
5 Open Source Security Risks You Should Know About - Xfive
Is Open Source Good for Security?
Open source software security challenges persist | CSO Online
Why is open source software more secure? | InfoWorld
Is Open Source Safe? security | PCWorld
3 Myths about Open Source Security: You Need to Know it
6 Open Source Software Security Concerns Dispelled
Is Open Source Really More Secure?
Four reasons you don't want to use open source software - security concerns | Opensource.com
How open source makes software more secure | Opensource.com
Six open source security myths debunked - and eight real challenges to consider | ZDNet
Encryption in Cloud Computing - Schneier on Security
Topics | American Scientist
Is Quantum Computing a Cybersecurity Threat? | American Scientist
Homomorphic Encryption - Schneier on Security
Homomorphic Encryption Breakthrough - Schneier on Security
Homomorphic encryption - extension to symmetric/asymmetric cryptography
Introduction – Homomorphic Encryption Standardization
A very casual introduction to Fully Homomorphic Encryption – A Few Thoughts on Cryptographic Engineering
Hacker Lexicon: What Is Homomorphic Encryption? | WIRED
NordVPN Launches Encryption Tool for Cloud-Stored Files
Advanced Linux backdoor found in the wild escaped AV detection – Antivirus evasion - Ars Technica
Five WordPress API Integration Techniques | Toptal
Five WordPress API Integration Techniques | Toptal
WordPress Maintenance Tips and Tricks | Toptal
WordPress Roots Stack Explained | Toptal
How a quantum computer could break 2048-bit RSA encryption in 8 hours - security, shor algorithm - MIT Technology Review
1978 Cryptosystem Resists Quantum Attack - post quantum cryptography, security - MIT Technology Review
Open Source Release coming for Microsoft’s Quantum Development Kit - Q# - Microsoft Quantum
Rigetti Computing - Forest SDK - quantum programming, Python, entanglement
Quantum Startups Network | Microsoft
Microsoft, Brilliant team up to offer quantum computing curriculum - course - Microsoft Quantum
Practice Quantum Computing - Microsoft Quantum Development Kit - Q# | Brilliant
GitHub - microsoft/QuantumKatas: Programming exercises for learning Q# and quantum computing
Q# Blog
Getting Started with Python and Q# | Microsoft Docs
Is there any way to decompile a .NET assembly or program? - Reverse Engineering Stack Exchange
Unpacking UPX packed (possibly scrambled) executable - Reverse Engineering Stack Exchange
The Most Powerful Arab Ruler Isn’t M.B.S. It’s M.B.Z. - warfare, geopolitics - The New York Times
Jusqu'où sont défiscalisés les dons des entreprises pour Notre-Dame? - Libération
Dons et impôt sur le revenu en 2019 : déduction ou réduction? 75% ou 66%?
Impôt sur le revenu - Dons aux associations et organismes d'intérêt général | service-public.fr
Dons aux associations : quelle réduction d’impôt ? | Le portail des ministères économiques et financiers
Dons et réductions d’impôt | impots.gouv.fr
J'ai fait des dons à une association. Que puis-je déduire ? | impots.gouv.fr
Dons exonérés | impots.gouv.fr
How to connect Google Home with a DIY smart home automation system? - Internet of Things Stack Exchange
Understanding a quantum algorithm to estimate inner products - Quantum Computing Stack Exchange
Is quantum cryptography safer than classical cryptography? - Quantum Computing Stack Exchange
What is the physical representation of a qubit? - Quantum Computing Stack Exchange
Are there other x86 Android phones than the Asus Zenfone? lenovo k80 - Hardware Recommendations Stack Exchange
Are DSA and ECDSA provably secure assuming Discrete Logarithm security? - Cryptography Stack Exchange
Universal hash functions with homomorphic XOR property - Cryptography Stack Exchange
zero proof knoweldge - How would I prove a number is not within a range? - Cryptography Stack Exchange
What information does $g^x$ reveal about $x$? group generator, RSA, discrete logarithm - Cryptography Stack Exchange
Soft question: Examples where lack of mathematical rigour cause security breaches? - Cryptography Stack Exchange
Adversarial Machine Learning Tutorial - security, artificial intelligence | Toptal
Offshore bank - money laundering, international - Wikipedia
Tax haven - Wikipedia
The Best Offshore Banks for 2019 | Nomad Capitalist
The Pros and Cons of Online Banking
Offshore Banking: How To Open The BEST Account - tax evasion | Sovereign Man
10 Reasons Why You Need an Offshore Bank Account Today - International Man
Offshore bank accounts: 10 things you should know - tax havens | finder.com.au
6 Best Offshore Banks for Opening Accounts - Recommendations and Tips
Tax Avoidance Is Legal; Tax Evasion Is Criminal
The Top Legal and Illegal Methods to Pay Less at Tax Time
3 Best Tax Avoidance Strategies
10 Accounting Tricks the 1% Use to Dodge the Taxman - tax havens - The Accounting Degree Review
Fifteen ways to reduce your tax bill | Financial Times
Tax Evasion ►Best Tips to legalize your Offshore Money fast
Tax Evasion and Tax Avoidance: What's the Difference and What Are the Penalties? - NerdWallet
Tax Avoidance
In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc - eternal blue, shadow broker, cyberwarfare - The New York Times
Cryptocurrency startup hacks itself before hacker gets a chance to steal users funds | ZDNet
GitHub - mirsamantajbakhsh/LiveHiddenCamera: Live Hidden Camera is a library which record live video and audio from Android device without displaying a preview. - RAT
Report: No ‘Eternal Blue’ Exploit Found in Baltimore City Ransomware — Krebs on Security
Hollywood lie: Bank hacks take months, not seconds - security | ZDNet
Kubernetes is an elegant dump truck: Here's why | Opensource.com
How to Encrypt Drives Using LUKS in Fedora Linux - block encryption
The Cost of Cybercrime - Schneier on Security
Windows 10 security: Microsoft issues Intel microcode updates against MDS attacks -Microarchitectural Data Sampling | ZDNet
Unpatched Bug Let Attackers Bypass Windows Lock Screen On RDP Sessions - CVE-2019-9510
GitHub - matonis/ripVT: Virus Total API Maltego Transform Set For Canari
With arrays, why is it the case that a[5] == 5[a]? - pointer arithmetic
Differences between std::make_unique and std::unique_ptr with new - Stack Overflow
'Sign In With Apple' Protects You in Ways Google and Facebook Don't - security | WIRED
Only 5.5% of all vulnerabilities are ever exploited in the wild | ZDNet
Even the NSA is urging Windows users to patch BlueKeep (CVE-2019-0708) | ZDNet
How to navigate the Kubernetes learning curve | Opensource.com
GitHub - ZHacker13/ReverseTCPShell: PowerShell ReverseTCP Shell, Client & Server.
This is how hackers make money from your stolen medical data | ZDNet
Lessons Learned Trying to Secure Congressional Campaigns - Schneier on Security
Europol’s top hacking ring takedowns - cybercrime, hacking groups dismanteled | ZDNet
Apple's 'Find My' Feature Uses Some Very Clever Cryptography | WIRED
Apple deprecates SHA-1 certificates in iOS 13 and macOS Catalina | ZDNet
A Push to Protect Campaigns from Hackers Hits an FEC Roadblock | WIRED
New RCE vulnerability impacts nearly half of the internet's email servers | ZDNet
Critical Flaws Found in Widely Used IPTV Software for Online Streaming Services - SQL injection
Kubernetes basics: Learn how to drive first | Opensource.com
Examples of blameless culture outside of DevOps | Opensource.com
Why hypothesis-driven development is key to DevOps | Opensource.com
Election Security Is Still Hurting at Every Level | WIRED
Huge scope of Australia's new national security laws reveals itself - government surveillance - | ZDNet
How to Create a New Ext4 File System (Partition) in Linux
Cryptocurrency Firm Itself Hacked Its Customers to Protect Their Funds From Hackers
Don’t let cybersecurity be driven by fear, warns NCSC chief. Scaring people about cybersecurity doesn’t work, says Ciaran Martin - particularly when it comes to 5G, Huawei and China.
Russia and Iran Plan to Fundamentally Isolate the Internet - government surveillance/censorship | WIRED
Chinese Military Wants to Develop Custom OS - hardening, secure OS - Schneier on Security
North Korea's Linux-based Red Star OS is as oppressive as you'd expect - surveillance state - ExtremeTech
GitHub - Zucccs/PhoneSploit: Using open Adb ports we can exploit a Andriod Device
Diebold Nixdorf warns customers of RCE bug in older ATMs- banking security | ZDNet
Firefox Monitor - haveibeenpwned
Open-source bionic leg: First-of-its-kind platform aims to rapidly advance prosthetics | University of Michigan News
Security and Human Behavior (SHB) 2019 - Schneier on Security
New Brute-Force Botnet Targeting Over 1.5 Million RDP Servers Worldwide - GoldBrute
5 reasons to use Kubernetes | Opensource.com
Working with Kubernetes Secrets and ConfigMaps | Opensource.com
Zydra - File Password Recovery Tool And Linux Shadow File Cracker
Windows 10 zero-day details published on GitHub . SandboxEscaper details new "ByeBear" zero-day impacting Windows 10 and Server 2019.
Cybersecurity: How to get your software patching strategy right and keep the hackers at bay. Applying patches can lead to unwanted downtime - but leaving them uninstalled can also cause major issues. Is it possible to find a balance?
Google confirms that advanced backdoor came preinstalled on Android devices – Ars Technica
Can we assume that a hash function with high collision resistance also means a highly uniform distribution? - Cryptography Stack Exchange
SPACE Y DUMP: Penetration Testing Report by Chrissa Constantine - network traffic analysis
Apps That Actually Profit: Mobile Analytics 101 | Toptal
The Khadas VIM3, the Amlogic S922X powered Raspberry Pi competitor, is launching on June 24 for US$69.99 - NotebookCheck.net News
FlashRouters Linksys WRT3200ACM Gigabit Wi-Fi VPN Router review
Build an easy RDP Honeypot with Raspberry PI 3 and observe the infamous attacks as (BlueKeep)…
Is Telegram secure? definitive argumentation - MTProto Protocol - comparison WhatsApp, Signal Information Security Stack Exchange
What is the difference between https://google.com and https://encrypted.google.com? - Information Security Stack Exchange
How is leaving a telephone on the ground a "classic anti-surveillance technique"? personal privacy - Information Security Stack Exchange
Sucuri detects malware on wordpress but I can't find the malicious code - XSS - Information Security Stack Exchange
Is open-sourcing the code of a webapp not recommended? - Information Security Stack Exchange
How bad would a partial hash leak be, realistically? hash cracking - slow derivation functions VS cryptographic hashing primitives - Argon2, scrypt, PBKDF2, bcrypt- Information Security Stack Exchange
Why is there a need to modify system call tables in Linux?hooking techniques that kernel-land rootkits use in order perform malicious actions. - Information Security Stack Exchange
Session Hijacking - What are the risks of just clearing cookies instead of logging off?definitive analogy - OWASP session management guidelines - Information Security Stack Exchange
PenTest: ERP Enterprise Resources Planning Software Pentesting - Pentestmag
How AI is impacting security in 2019 | BetaNews
Microsoft's BlueKeep Bug Isn't Getting Patched Fast Enough
How a quantum computer could break 2048-bit RSA encryption in 8 hours - 20-million-qubit quantum computer
Get ready for some serious Google operating system confusion - Chrome OS, Android, Fuschia | Computerworld
Keep your IBAN secret, it could be easily abused! - banking security, Amazon weakness | Approach
What are shares and why are they issued? | nibusinessinfo.co.uk
company shares - how do they work
Additional mitigations for speculative execution vulnerabilities in Intel CPUs - Apple Support
AMD Product Security - spectre, zombieload, MDS | AMD
Better JavaScript? Use TypeScript and Dependency Injection | Toptal
Simple explanation of Monero mechanics - how does Monero work? - Monero Stack Exchange
How is Monero compared to Dash? - Monero Stack Exchange
How to set Tor proxy for Windows 10 instead of VPN? - Tor Stack Exchange
What is a good way to concisely explain Bitcoin? definitive introductory explanation - Bitcoin Stack Exchange
What is a 'Satoshi'? units - Bitcoin Stack Exchange
Hardened Keys vs Normal Keys - A Simpler Explanation - Bitcoin Stack Exchange
Wordlists on Kali Linux? brute force password cracking (John the Ripper, ophtcrack, hashcat, etc) - /usr/share/wordlists - Information Security Stack Exchange
What is a specific example of how the Shellshock Bash bug could be exploited? - Information Security Stack Exchange
How can a company tell if my password is similar to the previous 5 passwords? secure password storage - Information Security Stack Exchange
Is my router's IP address really public? Carrier Grade NAT CGNAT at ISP level - anonymity - Super User
Can a hacker, that knows my IP address, remotely access accounts I have left logged in on my computer? DNS spoofing, MitM, VPN - CSRF - Information Security Stack Exchange
What can a hacker do with an IP address? NAT, Firewalls - Information Security Stack Exchange
Security vulnerabilities of POST over SSL - Information Security Stack Exchange
Website returning plaintext password - secure password storage - Information Security Stack Exchange
What to do about websites that store plain text passwords - secure storage - Information Security Stack Exchange
Plain Text Offenders - secure password storage
How to Approach Graphical Design for Developers | Toptal
Are there any OllyDbg anti-debug/anti-anti-debug plugins what work with Windows 7 / NT 6.x? - Reverse Engineering Stack Exchange
Reversing ELF 64-bit LSB executable, x86-64 ,gdb - _start(), __libc_start_main(), main() function runup - Reverse Engineering Stack Exchange
How do I analyze a android application .apk file and understand its working? - Reverse Engineering Stack Exchange
x86 shellcode leads to segmentation fault - execve - Reverse Engineering Stack Exchange
Private Internet Access VPN Review: Secure & Fast, But Two Drawbacks
What is a CDN and why use one with WordPress? privacy respectuous alternative to Cloudflare - Pressidium® Managed WordPress Hosting
The power of SSH tunneling. How it can make your developer life easier
How to Add a Power Button to Your Raspberry Pi
Is SEAL war crimes suspect Eddie Gallagher innocent? warfare, geopolitics
Intel Follows AMD's Lead on Full Memory Encryption - MKTME, MDS, Spectre
BlueKeep scans observed from exclusively Tor exit nodes
Intense scanning activity detected for BlueKeep RDP flaw. A threat actor hidden behind Tor nodes is scanning for Windows systems vulnerable to BlueKeep flaw.
Outline - Read & annotate without distractions - Bypass Paywalls
Any tips to bypass paywalls? - Piracy
Paywall - hard vs soft - Wikipedia
Read articles behind paywalls by masquerading as Googlebot - gHacks Tech News
Battle of the Paywalls – Poool Stories – Medium
Learn about the different types of paywall strategies
The psychology behind why journalism paywalls still don't work — Quartz
Paywalls: Are they effective?
How to Get Around The Foreign Policy Paywall – Black Edge Consulting – Medium
How to quickly bypass the paywalls of WSJ, NYT and others
How To Deprive Mainstream Media Of Revenue And Get Around Their Paywalls – Caitlin Johnstone
How to Bypass Paywalls of Leading News Websites - Make Tech Easier
How does Google know where I am? personal/physical privacy, geolocation without WiFi nor GPS - Opt out of Google BSSID Mapping with no_map suffix - Information Security Stack Exchange
What are the security risks to displaying an image loaded over http in a page loaded over https? mixed content - Information Security Stack Exchange
Does a single fopen introduce TOCTOU vulnerability? openat, opendir - Information Security Stack Exchange
Does putting salt first make it easier for attacker to bruteforce the hash? hash(salt + password) VS hash(password + salt).
Ability To Change Root User Password (Vulnerability?) - physical access, disk encryption, encrypted boot, UEFI - Information Security Stack Exchange
Ten Immutable Laws Of Security (Version 2.0) – Roger's Security Blog
UEFI DEFENSIVE PRACTICES GUIDANCE - definitive - MBR, GPT
RARE EARTH MATERIALS - Developing a Comprehensive Approach Could Help Department Of Defense Better Manage National Security Risks in the Supply Chain - cyberwarfare - U.S, China
25 Amazing Tech Companies Hiring in Dublin | Indeed.com
7 US companies hiring in Ireland right now
The Spycraft Revolution - cyberwarfare, espionnage – Foreign Policy
Which tech companies are based in Ireland?
Do you really need a KDF Key Derivation Function when you have a PRF Pseudo Random Function ? - Cryptography Stack Exchange
MMIX (pronounced em-mix) is a 64-bit reduced instruction set computing (RISC) architecture designed by Donald Knuth
MIX is a hypothetical computer used in Donald Knuth's monograph, The Art of Computer Programming (TAOCP). MIX's model number is 1009, which was derived by combining the model numbers and names of several contemporaneous, commercial machines deemed significant by the author. Also, "MIX" read as a Roman numeral is 1009.
Box (Internet) = residential gateway — Wikipédia
Residential gateway = box internet in french - Wikipedia
Routeur WiFi, Modem, Switch et Box : Quelle différence ?
Box internet Vs Routeur : Quelle différence et lequel choisir ? - Routeur-Wifi
IPTV - Wikipedia
Set-top box = décodeur TV — Wikipédia
Décodeur TV = set-top box— Wikipédia
Web television - Wikipedia
Streaming/Internet television - Wikipedia
Cable, Satellite, IPTV & OTT Streaming: What's the Difference? - Broadband Now
TV System: how does IPTV compare to Cable, Satellite, and OTT?Nevron Blog
Internet TV vs Internet Protocol Television - SmartData Collective
Question - Quora
Internet Set-Top Boxes: What Do Users Want? | TechHive
Our Picks for Best IPTV Set Top Boxes 2019 | WirelesSHack
Set-Top Box Anti-Piracy Code Neutralized By Hack - TorrentFreak
Hack Your Streaming Set-Top Box | TechHive
Card sharing - Pay TV conditional access hacking, - Wikipedia
IPTV illégale : ou comment accéder à 1400 chaînes de TV et 1600 films VOD pour 25 euros par an - smart tv, kodi addons, card sharing, set top box hacking - CNET France
Comment les sites (illégaux) de streaming de football réussissent à égaler les diffuseurs officiels - IPTV stream hacking - CNET France
“Free TV” box lawyer says video industry is “digging its own grave” - IPTV Hacking | Ars Technica
Le piratage IPTV, nouveau cauchemar des ayants droit - Hacking
7 VPN Scams You Need to Avoid | Restore Privacy
Banana Pi BPI-M4, a Raspberry Pi clone that packs a more powerful SoC and costs just US$35 - NotebookCheck.net News
Hardware Security Keys Keep Getting Recalled; Are They Safe?
Facebook got 187,000 users’ data with snoopy VPN app – Naked Security
RAMBleed Side-Channel Attack Exposes Privileged Memory -direct memory access (DMA)-based Rowhammer attacks against the latest Android OS, consisting of a root exploit, and a series of app-to-app exploit scenarios that bypass all defenses. | Threatpost
Security bug would have allowed hackers access to Google's internal network - Security researcher finds dangerous XSS bug in Google's Invoice Submission Portal | ZDNet
Huawei pushes ahead with own operating system - Chinese telecom company targets Hongmeng software to replace Alphabet’s Android operating system
Why are rings called rings? - Mathematics Stack Exchange
Phishing Secrets: Attack & Protection - active directory, pivot attacks, VoIP, vlan, blockchain - IT Security MagazineLP
How to prove element equality in G1 using Groth-Sahai proofs - the BeleniosRF e-voting scheme - Cryptography Stack Exchange
SHA512 faster than SHA256? - Cryptography Stack Exchange
What makes lattice-based cryptography quantum-resistant? post quantum cryptography - Cryptography Stack Exchange
Why is a common reference string needed in zero knowledge proofs? - Cryptography Stack Exchange
Firefox Now Available with Enhanced Tracking Protection by Default Plus Updates to Facebook Container, Firefox Monitor and Lockwise - The Mozilla Blog
Bitcoin Rally Masks Fact Almost Nobody Uses It - Bloomberg
Google Online Security Blog: PHA Family Highlights: Triada rooting Trojan/Backdoor
US aviation authority: Boeing 787 software bug could cause 'loss of control' | Technology | The Guardian
737MAX Software Safety Bug - definitive article
11 Essential ASP.NET Interview Questions and Answers
How To Deal With A Hacker Finding Holes In Your Security
Automatic SSRF fuzzer and exploitation tool - Server Side Request Forgery or SSRF is a vulnerability in which an attacker forces a server to perform requests on their behalf.
Exploring Mimikatz - Part 1 - WDigest
Cross-Site Request Forgery Attack - YouTube
Google, Amazon, Facebook & Twitter are evil - privacy violations
Amazon may well be the most evil company in tech
Question - Quora
What is TV operating system? - Definition from WhatIs.com
Android TV reportedly makes up 1 of every 10 Smart TVs Operating Systems - 9to5Google
What Is the Best Smart TV Operating System? Roku TV, Android TV, Fire TV, WebOS, and TizenOS
Few Realize “Private Mode” browsing Is Not Really Private | Brave Browser
What kind of information is exposed during a Firefox private browsing session? browser fingerprinting - Information Security Stack Exchange
Is Private Browsing Really Private? Short answer: No | Norton
Is Firefox’s Private Browsing Really Private?
Private Browsing - Use Firefox without saving history | How to | Mozilla Support
Common Myths about Private Browsing | How to | Mozilla Support
Malboard: New Computer Attack Mimics User’s Keystroke Characteristics and Evades Detection - Article On The new paper, Malboard: A Novel User Keystroke Impersonation Attack and Trusted Detection Framework Based on Side-Channel Analysis
Computers & Security journal | ScienceDirect.com
Do you clone Git repos via HTTPS or SSH? - DEV Community 👩‍💻👨‍💻
Linux Command-Line Editors Vulnerable to High-Severity Bug - Vim Exploitation -allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, escaping vim sandboxing - mitigation vimrc | Threatpost
Enable or Disable UEFI Secure Boot for a Virtual Machine
PureBoot, the High Security Boot Process - definitive breakdown and solution to secure boot – Purism
ESP32 - series of low-cost, low-power system on a chip microcontrollers with integrated Wi-Fi and dual-mode Bluetooth. The ESP32 series employs a Tensilica Xtensa LX6 microprocessor in both dual-core and single-core variations and includes in-built antenna switches, RF balun, power amplifier, low-noise receive amplifier, filters, and power-management modules. ESP32 is created and developed by Espressif Systems, a Shanghai-based Chinese company, and is manufactured by TSMC using their 40 nm process.[2] It is a successor to the ESP8266 microcontroller.
TPM Encryption in Fedora Linux - secure boot, luks – Techrevelations
Secure Boot - UEFI, GRUB - Funtoo
GRUB - GRand Unified Bootloader - multi-boot loader derived from PUPA - definitive guide
Notes on dual-booting Linux with BitLocker Device Encryption and Secure Boot - definitive article | Ctrl blog
Secure boot and device encryption overview - UEFI - Windows drivers | Microsoft Docs
Intel Trusted Execution Technology (Intel TXT, formerly known as LaGrande Technology) is a computer hardware technology. Intel TXT uses a Trusted Platform Module (TPM) and cryptographic techniques to provide measurements of software and platform components so that system software as well as local and remote management applications may use those measurements to make trust decisions. It complements Intel Management Engine. This technology is based on an industry initiative by the Trusted Computing Group (TCG) to promote safer computing. It defends against software-based attacks aimed at stealing sensitive information by corrupting system or BIOS code, or modifying the platform's configuration.
If you're not using TXT Trusted Execution Technology , your full disk encryption is completely useless - secure boot, UEFI, backdoor | Hacker News
SecureBoot and Encryption - firmware encryption · GitBook
Take Control of Your PC with UEFI Secure Boot - definitive technical dive | Linux Journal
Full Disk Encryption, UEFI, Secure Boot and Device Guard
Secure Boot, Yay or Nay? - archlinux
Content Spoofing - vs XSS, HTML injection - OWASP
cCloud TV BETA V0.7 - kodi addon |Social IPTV Service for LIVE TV,Movies,TV Shows & Radio
cCloud TV BETA V0.7 - servers availability status - kodi addon | Social IPTV Service for LIVE TV,Movies,TV Shows & Radio
Official cCloud Kodi Addon Guide: 1000+ Free Live TV Channels
M3U - MP3 URL or Moving Picture Experts Group Audio Layer 3 Uniform Resource Locator in full is a computer file format for a multimedia playlist.
Best Arabic Kodi add-ons: How to Watch Arabic Movies, TV Shows on Kodi
11 Best Kodi Maintenance Tools for Managing Kodi Efficiently - security
Kodi WARNING - Security risk alert after popular add-on makes SHOCK claim | Express.co.uk
3 Ways Your Kodi Box Could Be at Risk From Malware - security
Tips to Keep Your Kodi Secure and Safe from Hackers (No Need to Panic)- security
Bad Addons Cause Kodi Security Risks
Requests, Recommendations, & Basics - December 2018 - Addons4Kodi
Want "Kodi Builds" and Security? Use Batch Installers Instead... - Addons4Kodi
People using unofficial kodi addon on linux should check their home folder for suspected file. - Addons4Kodi- security
darknessally/firerises - ccloudtv kodi addon source and zips· GitHub
Some Kodi add-ons are carrying cryptocurrency mining malware- security| TechRadar
Kodi Malware: How to Check if Gaia Has Infected You - security
Another reason to avoid builds: malware - security
Malware from Kodi on Raspberry Pi can swap on Windows? Gaia - security- Addons4Kodi
Kodi and Streaming Security Guidelines and Alerts | TV ADDONS
Is Kodi Safe and Legal? malicious malware, sandboxing kodi - security -What Precautions Should You Take?
Illegal Kodi plugins may compromise your personal security- security | ZDNet
How To Install Secure Team Kodi Addon - security
Mitigating Threats in IoT Network using Device Isolation - security
Hack My House: Opening Raspberry Pi To The Internet, But Not The Whole World - security | Hackaday
20 Best Raspberry Pi Projects That You Can Start Right Now
Armory Sandbox – Building a USB analyzer with USB armory - secure boot High Assurance Boot, air gap
Secure Boot on i.MX 50, i.MX 53, i.MX 6 and i.MX 7 Series using HABv4 High Availability Boot
High Assurance Boot , secure boot - Variscite Wiki
Vulnerabilities in High Assurance Boot of NXP i.MX microprocessors - secure boot
Securing Your Raspberry Pi - F-Secure Blog
Child Safety: How to sandbox your children's web traffic cheaply using a Raspberry Pi - network security, firewalls
Securing your Raspberry Pi - hardening - Raspberry Pi Documentation
What is Sandboxing and How to Sandbox a Program | Comparitech
Kodi - installation details - ArchWiki
Major HSM vulnerabilities impact banks, cloud providers, governments - Researchers disclose major vulnerabilities in HSMs (Hardware Security Modules). - firmwares
The bits and bytes of PKI - Abstract Syntax Notation One (ASN.1) - Objects Identifiers OID
RAMBleed Attack – Flip Bits to Steal Sensitive Data from Computer Memory - rowhammer
Rock-Paper-Scissors Robot - artificial intelligence - Schneier on Security
Cloudflare’s Five-Year Project to Protect Nonprofits Online | WIRED
Financial Forensics - Anti Money Laundering Tools and Techniques, Cryptocurrency transactions tracking - eForensics
Samsung asks users to scan their Smart TVs for malware - Here's how to - IoT security
Cloudflare expands government warrant canaries in transparency bid | ZDNet
Can Russian hackers be stopped? Here's why it might take 20 years - Cyberwarfare
Cyberwar predictions for 2019: The stakes have been raised | ZDNet
Vulnerability Analysis - Wiki - VulWiki
Computer emergency response team - aka CERT
Vulnerability Analysis - Responsible Disclosure
Build automation - Wikipedia
Array declaration in C++ - cppreference.com
General-purpose input/output - GPIO
WhiteHat Security - DevOps Security, DevSecOps - DAST/SAST
Hardening ELF binaries using Relocation Read-Only (RELRO)
Expert system - Comprised of Inference Engine and Knowledge Base - In artificial intelligence, an expert system is a computer system that emulates the decision-making ability of a human expert.[1] Expert systems are designed to solve complex problems by reasoning through bodies of knowledge, represented mainly as if–then rules rather than through conventional procedural code
Topological sorting - Kahn/Depth-First Algorithms
TI-Planet | Programmes, Tutoriaux, Forum sur les calculatrices TI - TI Calculator - definitive reference site
Remote keyless system - Cars Hacking - Security
Samy Kamkar - American privacy and security researcher, computer hacker, whistleblower and entrepreneur - Samy worm, Evercookie
Samy (computer worm) - developed by Samy Kamkar
Evercookie - Tacking cookie targetting Tor users - Developed by Samy kamkar
Modern Security - How Remote Car Entry Works - remote keyless system - PRNG -
7 ways Hackers are Stealing Remote Keyless Cars | Komando.com
Signal Amplification Relay Attack (SARA) – Car Remote Keyless Entry systems
How secure is a car with a 'remote keyless entry' system? - automobile security | Ask MetaFilter
wireless - Vehicle remote key security - car keyless remote system
Lock It and Still Lose It —on the (In)Security of Automotive Remote Keyless Entry Systems | USENIX
CloudFlare Bypass Method iplogger - YouTube
HTML + CSS + JavaScript introduction - web 0x00 - YouTube
The HTTP Protocol: GET /test.html - web 0x01 - YouTube
What is PHP and why is XSS so common there? - web 0x02 - YouTube
XSS Contexts and some Chrome XSS Auditor tricks - web 0x03 - YouTube
CSRF Introduction and what is the Same-Origin Policy? - web 0x04 - YouTube
The Curse of Cross-Origin Stylesheets - Web Security Research - YouTube
EP3: How to be a paid bug bounty hunter (EN) - YouTube
Facebook Bug Bounty Guide | API testing - YouTube
Bug Bounty Hunting Methodology v2 - Jason Haddix from Bugcrowd's LevelUp 2017 - YouTube
Bug Bounty 101 - How To Become A Bug Hunter - Bug Bounty Talks - YouTube
Creativity in Binary Exploitation - LiveOverflwo definitive
Voice phishing - vishing - social engineering
Phone fraud - Phishing - Social Engineering
SMS phishing - social engineering
VoIP spam - Wikipedia
Are pointers really faster than arrays? How much do function calls slow things down? Is ++i faster than i = i + 1? Performance
declaration - Is is a good practice to put the definition of C++ classes into the header file? - Stack Overflow
Global System for Mobile Communications (GSM)
5 Raspberry Pi Operating Systems That Aren't Linux - Android things, Windows 10 Core IoT
mbedded.ninja | ARM Cortex-M3 - definitive in depth analysis - memory layout - assembly
http - What exactly is RESTful programming? - Stack Overflow
webserver - Difference between proxy server and reverse proxy server - forward proxy vs reverse proxy
linux - How to check that AES-NI is supported by my CPU? - Unix & Linux Stack Exchange
PowerPC storage model and AIX programming
How do I check that users don't write down their passwords? - password management, policy - awareness training
loops - For vs. while vs do while in C programming? - break, continue
10 fdisk Commands to Manage Linux Disk Partitions - stands for fixed disk or format disk
Partitioning with fdisk - primary/logical partition
filesystems - File systems vs partitions vs directories - definitive filesystem definitions based on contexts
filesystems - Is file system part of operating system? - volume manager
unix - HFS theory: What else is there to a system other than a root filesystem? - Server Fault
fdisk - list partition, restore/backup partition table
linux - What's the difference between fdisk -l and df -h? - GUID Partition table GPT support
linux - Difference between df-h and fdisk command - Stack Overflow
linux - why df vs lsblk command have different results? - fdisk, resize2fs
Selecting the Right Encryption Approach | Data Encryption Types | choice
key management - Can you extract the encryption key of a computer with full disk encryption via malware? - Information Security Stack Exchange
encryption - HDD password vs Bitlocker - Information Security Stack Exchange
encryption - Hardware encrypted external HDDs - SEDs self encrypting drive, threat model
key management - How dependable can data encryption be without re-entry of password on startup? - fde, cold boot attack, threat model - SED, hardware based FDE
sql server - SQL field level encryption, how safe is it? - Information Security Stack Exchange
Booting - boot process - BIOS, Boot loader, Kernel, Upstart starts plymouth, mountall, network services, display managers - MBR, Grub boot loader, finding root partition
Boot sector - region of a hard disk, floppy disk, optical disc, or other data storage device that contains machine code to be loaded into random-access memory (RAM) by a computer system's built-in firmware
Firmware - pecific class of computer software that provides the low-level control for the device's specific hardware - definitive firmware Flashing definition - hacking - HDD firmware modification by equation group NSA hackers - proprietary firmware security risks
file unix command - recognizing the type of data contained in a computer file - libmagic library - Single Unix Specification SUS
Single UNIX Specification - Wikipedia
/dev/random - device file - PRNG
Pseudorandom number generator - PRNG - deterministic generators - mathematical definition - non-uniform generators
List of random number generators - RNGs
Block (data storage) = physical record - sequence of bytes or bits, usually containing some whole number of records, having a maximum length, a block size. Data thus structured are said to be blocked. The process of putting data into blocks is called blocking, while deblocking is the process of extracting data from blocks.
Disk sector - vs block - dd command - fdisk -l - blockdev --getbsz /dev/sda
File System Forensic Analysis: PC-based Partitions | DOS Partitions | InformIT
UNIX / Linux: Copy Master Boot Record (MBR) - MBR size with bootstrap, partition table and signature - dd comamnd
Convert a partition image to a bootable disk image - MBR sector - definitive guide - fdisk
BIOS - Basic Input/Output System and also known as the System BIOS, ROM BIOS or PC BIOS) is non-volatile firmware used to perform hardware initialization during the booting process (power-on startup) - stored in flash memory
Intel Active Management Technology AMT - The obscure remote control in some Intel hardware — Free Software Foundation — working together for free software - security concerns - free software foundation - hardware backdoors
BIOS Hacking - NSA NOBUS NObody But US - OS reinstallation resistant malware - firmware
What is the standard file system that a SD card have to use before write Raspbian using dd command? - Raspberry Pi Stack Exchange
filesystem - What format should my SD card be? - Raspberry Pi Stack Exchange
filesystem - How does any file system REALLY work on a Raspberry Pi SD card? - SD Cards microcontroller
Filesystem Basics with the Raspberry Pi – Simply Embedded
The 4 Best Google Play Alternatives for Downloading Android Apps - F-Droid
Etcher (software) - balenaEtcher - free and open-source utility used for writing image files such as .iso and .img files, as well as zipped folders onto storage media to create live SD cards and USB flash drives
Creating bootable disk using “dd” linux command - Fatah Nur Alam Majid - definitive
linux - Differences between /dev/sda and /dev/sda1 - disk vs partition - device node in /dev - sda is a raw device, sda1 is a virtual device/partition
How to make the dd command be verbose? - Ask Ubuntu
monitoring - How do you monitor the progress of dd command ? - verbose mode
clone - is 'dd' command taking too long? - verbose mode
Linux dd Command Show Progress Copy Bar With Status - verbose mode - definitive
What’s the Difference Between GPT and MBR When Partitioning a Drive? UEFI vs BIOS
MBR vs. GPT Guide: What's The Difference and Which One Is Better
macos - Disk Image vs. Partition - iso, img, dmg
USB flash installation media - dd command with drive name NOT with partition - SquashFS
images - copying a sd card using dd command does not copy exactly - check error in copying/cloning
Petya Ransomware skips the Files and Encrypts your Hard Drive Instead
Petya ransomware and NotPetya malware: What you need to know - MBR encryption - definitive breakdown - EternalBlue, EternalRomance
Petya (malware) - ransomware - NotPetya - MBR infection, Bootloader overwriting - EternaBlue, SMB vulnerability
Ransomware: The key lesson Maersk learned from battling the NotPetya attack | EternalBlue, WannaCry
How do I forcefully unmount a Linux disk partition? - umount command
The NanoPi NEO4: Is This the Raspberry Pi Killer? alternative
How to finally Install Android on your Raspberry Pi? [Complete Guide] – Emteria OS
14.04 - Do I have to unmount the drive when using dd command? umount
Make Your Own DIY Chromecast Replacement With Raspberry Pi - raspicast
FLOPS - floating point operations per second (FLOPS, flops or flop/s)
Understand measures of supercomputer performance and storage system capacity - Measure computer performance in FLOPS - Measure storage capacity in bytes - Giga/Tera/Peta/Exa FLOPS/Bytes - definitive breakdown
Conventional PCI = Peripheral Component Interconnect
PCI-X = Peripheral Component Interconnect eXtended
PCI Express = PCIe = PCI-e = Peripheral Component Interconnect Express
SATA Express (abbreviated from Serial ATA Express and sometimes unofficially shortened to SATAe) is a computer bus interface that supports both Serial ATA (SATA) and PCI Express (PCIe) storage devices
Serial ATA = SATA = Serial Advanced Technology Attachment | computer bus interface that connects host bus adapters to mass storage devices such as hard disk drives, optical drives, and solid-state drives. Serial ATA succeeded the earlier Parallel ATA (PATA) standard - mSATA = miniSATA
ATA Packet Interface - ATA Packet Interface (ATAPI) is a protocol that has been added to Parallel ATA and Serial ATA so that a greater variety of devices can be connected to a computer than with the ATA command set alone
IBM Personal Computer/AT - PC AT - Advanced Technology
Microprocessor development board - Wikipedia
Asus Tinker Board - SCB Single Board Computer
Comparison of single-board microcontrollers - list
Comparison of single-board computers - list - SBCs
Clock rate - refers to the frequency at which a chip like a central processing unit (CPU), one core of a multi-core processor, is running and is used as an indicator of the processor's speed. It is measured in clock cycles per second or its equivalent, the SI unit hertz (Hz)
RAR (file format) - Wikipedia
What is the difference between PIC, AVR, ARM and Arduino Microcontrollers? - Quora
Difference between Microprocessor and Microcontroller | Microcontroller vs Microprocessor
Difference Between Microprocessor and Microcontroller
Difference between Microprocessor and Microcontroller
HackerOne - Wikipedia
Bug bounty program - Wikipedia
Zerodium - Wikipedia
Tips from Top Hackers - How to fit bounties into your schedule and maximize payouts | How to avoid dupes/duplicates
Leaky abstraction - TCP/IP Protocol Stack
Byte Order - Endianness - ON HOLY WARS AND A PLEA FOR PEACE
encryption - What is the difference between encrypted data and data sent through an encrypted tunnel? L2TP, GRE, IPSec, VPN protocols - Layers
#define NULL ((char *)0) VS #define NULL ((void *)0) - flat memory architectures
circle/alloc.cpp at master · rsta2/circle · GitHub
Using MD5 for file integrity checks? collision vs second preimage
How, why, and when you should hash check
PGP vs Hash functions - Information Security Stack Exchange
Hash match vs PGP to ensure integrity - Cryptography Stack Exchange
Want to understand Pretty Good Privacy? Simulate it - pgp
RFC 4880 - OpenPGP Message Format
How Pretty Good Privacy works, and how you can use it for secure communication
The Developer's Guide to Cryptography: Hash Functions and HMACs | Justin Boyer
How do I disable "Restore Previous Session" in Mozilla Firefox? - browser privacy
Preboot eXecution Environment (PXE, most often pronounced as pixie[1]) specification describes a standardized client-server environment that boots a software assembly, retrieved from a network, on PXE-enabled clients. On the client side it requires only a PXE-capable network interface controller (NIC), and uses a small set of industry-standard network protocols such as DHCP and TFTP. The concept behind the PXE originated in the early days of protocols like BOOTP/DHCP/TFTP, and as of 2015 it forms part of the Unified Extensible Firmware Interface (UEFI) standard. In modern data centers, PXE is the most frequent choice[2] for operating system booting, installation and deployment.
What disk image should I use with VirtualBox, VDI, VMDK, VHD or HDD? - Super User
What is the difference between a meta search engine and a web search engine? - Quora
Tin Hat is a Security-focused Linux distribution derived from Hardened Gentoo Linux. It aims to provide a very secure, stable, and fast desktop environment that lives purely in RAM - LUKS, SquashFS - full disk encryption, file system - loop aes v3 - encryption metadata - encrypted data indiscernible from random data - PaX/Grsecurity Hardening - non modular kernel to mitigate malicious module insertion
SRAM vs DRAM - Difference and Comparison | Diffen
DDR vs SDRAM - Difference and Comparison | Diffen
DDR3 vs DDR4 - Difference and Comparison | Diffen
WPA2 vs WPA3 - wifi security
KRACK Attacks: Key Reinstallation Attacks - Breaking WPA2 by forcing nonce reuse
Live USB - List, benefits and limitations
CustomizeLiveInitrd - grub loader
Amiga rigid disk block - RDB
Gbps, pps, rps DDoS, explaining volumetric, protocol and application layer attacks - metrics
Why is bitcoin written in C++? - attack surface
What advantages does Monero offer that are not provided by other cryptocurrencies? - fungibility, unlinkability, privacy
Is MQTT scalable with 1000+ clients? - Internet of Things Stack Exchange
Why do I need hubs for some devices when automating my home? - smart home, IoT
A Thorough Guide to Home Automation and Smart Home Technology
Wemo Home Automation vs. SmartThings Hub: Choose Wisely! | All Home Robotics
A Java Automation Testing Tutorial | Toptal
PenTest: The Art of Threat Modeling - AWS Security, Supply Chain
PenTest: Fintech Security - fix protocol, financial tech security
Is there any protocol for proving that a message was written at a certain time? - collision resistant hash, blockchain
Collision resistance of partial SHA-256 hashes XOR'ed - Cryptography Stack Exchange
Can a public key be same as private key? - Cryptography Stack Exchange
How do we know a cryptographic primitive won't fail suddenly? definitive answers - security proof, unprovable, one time pad - unconditional/information-theoretic security
definitive answers - What's the mathematical model behind the security claims of symmetric ciphers and digest algorithms? - security proof of cryptographic primitives - unprovable - unconditional/provable/information-theoretic/unbreakable security - P = NP, computational complexity classes - SAT problem
How to prove the security of the PRNG? - security proof - unprovable - provable security
How I use Raspberry Pis for HomeKit automation by Adam Argo - smart home
How to Start Your Career in Cybersecurity by Sai Digbijay - certifications, learning path
OpenBSD 6.4: Installing a Seriously Underrated OS in a Virtual Machine by Frederik Kreijmborg - Hakin9 - IT Security Magazine
Web App PenTest Reporting - How to write penetration test report
Blockchain Technology: Can It Open A New Front In Cybersecurity? decentralized, permissioned, permissionless, ddos
Universal Radio Hacker: Investigate Wireless Protocols like a Boss - fuzzing
Hakin9: Attack and Defence in Blockchain Technologies - Blockchain and Smart Contract Development - Blockchain and Smart Contract Security Auditing and Attacking - Security Principles for Blockchain Implementations and Coding - Security Principles for Smart Contract Implementations and Coding
How to Create a Telegram Bot | chatbot, python
Reversing AND / shift instructions used in succession - encryption function
Trouble when reverse engineering a industrial robot software in order to get some values - Reverse Engineering Stack Exchange
Computer name naming convention for security - predictable/unpredictable host name advantages/drawback, nslookup
What are the differences of checking a self-signed certificate vs ignore it? - Information Security Stack Exchange
Data Encryption by Application vs Data Encryption in Database - side channel attacks, least privilege principle
Timing attack - Is safe to check if strings have the same length? - sha256 crypt, pbkdf2
Sensitive Compartmented Information - Wikipedia
Top Secret / Sensitive Compartmented Information - TS/SCI
How were nuclear launch codes authenticated? - cyberwarfare, warfare
What is the difference between Federated Identity FID and Single Sign On SSO ? - Information Security Stack Exchange
What happens if your bitcoin client generates an address identical to another person's? break secp256k1
Facebook Bug bounty page admin disclose bug {Facebook Android app}
The F-35 Has a Major Spare Parts and Programming Problem | warfare, defect
Ramanujan summation - divergent series
German banks are moving away from SMS one-time passcodes | SIM Swapping mitigation
Vulnerabilities found in GE anesthesia machines | health care security
Zoom App Will Fix the Flaw That Let Hackers Hijack Webcams | security, vulnerability
The world's most famous and dangerous APT (state-developed) malware | list advanced persistent threat malwares stuxnet, shamoon
Microsoft July 2019 Patch Tuesday fixes zero-day exploited by Russian hackers | ZDNet
US Coast Guard warns about malware designed to disrupt ships' computer systems | US Coast Guard also shares a list of cybersecurity best practices for commercial vessels - cyberwarfare
Cyber spies take a step out of the shadows with history of codebreaking | Traditionally secretive agencies must be open with the public about the dangers they face and how to combat them, says GCHQ chief - cyberwarfare
Cell Networks Hacked by (Probable) Nation-State Attackers - cellular communications security, cell phone, mobile, networks, infrastructure
Microsoft warns about Astaroth malware campaign | New hard-to-detect Astaroth campaigns spotted using fileless execution and living-off-the-land techniques.
GitHub - diego-treitos/linux-smart-enumeration: Linux enumeration tool for pentesting and CTFs with verbosity levels
Ransomware Recovery Firms Who Secretly Pay Hackers - Schneier on Security
Backdoor found in Ruby library for checking for strong passwords | Cookie-accepting, eval-running backdoor found in popular Ruby library.
How to Protect Our Kids' Data and Privacy | child privacy
3.5. /boot : Static files of the boot loader - linux file system hierarchy, MBR master boot sectors, /sbin folder,
encryption boot sector site:*.stackexchange.com at DuckDuckGo
encryption mbr site:*.stackexchange.com at DuckDuckGo
MBR and VBR specifics - boot process, boot.img, grub
Question - Quora
Volume Boot Record - VBR
OSCE/CTP Prep Guide – Tulpa Security
Cracking the Perimeter (CTP) + Offensive Security Certified Expert (OSCE)
CTP/OSCE Prep – Wrapping Up Our Prep - The Human Machine Interface
Windows 10 Expert's Guide: Everything you need to know about BitLocker | full disk encryption
How to Reinstall Windows 10 without CD/USB Easily (3 Skills)
How to Reinstall Windows 10 Without Installer CD - EaseUS
SSH Considered Harmful – Why you shouldn’t be using raw ssh sessions – Software the Hard way
$500 000 Bug Bounty Campaign - DEV Community 👩‍💻👨‍💻
Pirate decryption - hacking paid channels tv, set top box, démo, décodeur, satellite channels
GitHub - alexandreborges/malwoverview: Malwoverview.py is a first response tool to perform an initial and quick triage on either a directory containing malware samples, specific malware sample or even a suspect URL.
SATA Hard Drive vs SSD Hard Drive | Pluralsight
What is the difference between SATA, SSD and HDD?
A Look at the Differences Between SSD and HDD
SSD vs HDD: which is best for your needs? | TechRadar
Sleep Mode is Vulnerable Mode - full disk encryption, Hibernation, pre-boot authentication - cold boot authentication
F-Secure’s Guide to Evil Maid Attacks - F-Secure Blog
Is laptop "secure sleep" mode theoretically possible? - direct memory ram access, full disk encryption attack
At Rest Encryption | full disk encryption limitations, cold boot attack
Cold Boot Attacks: Vulnerable While Sleeping - full disk encryption
Install Ubuntu with Full Disk Encryption and Encrypted Boot - ChinnoDog’s Blog
What's a good solution to encrypt a partition or hard-drive that needs to be shared between Windows and Linux? full disk encryption FDE, veracrypt
Encrypted custom install - Ask Ubuntu - installation LVM vs full disk encryption
Encrypting disks on Ubuntu 19.04 - full disk encryption, boot partition
What is a Boot Sector? MBR, VBR, Partitions
Difference between installing GRUB on MBR sector or first sector on boot partition? - bootable partition, boot code,
How dangerous is storing the hashed password in local storage? - client side, xss
Client side password hashing - pbkdf2
Are randomly-generated passwords starting with "a" less secure? - entropy, strong password cracking, kerkhoff principles
14 Essential GitHub Interview Questions and Answers
Global Positioning System - GPS
Question - Quora
OpenStreetMap - OSM - Google map privacy oriented alternative
OsmAnd - android frontend app to OSM Open Street Maps
Maps.me - Mobile frontend app to OSM Open Street Map
'Why use OpenStreetMap instead of Google Maps?' - openstreetmap
When do you think it is worth switching to OSM from GMaps? - openstreetmap
I need an Android Navigation App... OsmAnd sucks for freeways, and MagicEarħ is clunky - openstreetmap - maps.me
How does GPS work on my phone? | Assisted GPS AGPS
Google still tracks your location even when you turn off Location History [Update] | geolocation physical privacy
No Signal? 5 Ways to Use Your Phone GPS Without mobile Data | SmarterTravel
Wi-Fi positioning system - WFPS, vs GPS
Indoor positioning system - IPS, vs GPS, RSSI, Trilateration, Triangulation, Wifi based Positioning System WPS
Satellite navigation - global navigation satellite system (GNSS)
Location services: Which option is right for you? | location mode, high accuracy, device only, battery saving, gps WiFi mobile data bluetooth
How to Stop Google From Tracking Your Location | privacy, physical
Google Europe Blog: Data collected by Google cars - gps, WiFi, geolocation privacy
Radio wave - Risks, health effect - carcinogenic - International Telecommunications Union (ITU)
Mobile phone operator - A mobile phone operator, wireless provider, or carrier is a mobile telecommunications company that provides wireless Internet GSM services for mobile device users. The operator gives a SIM card to the customer who inserts it into the mobile device to gain access to the service. There are two types of mobile operators: a mobile network operator (MNO) which owns the underlying network and spectrum assets required to run the service - a mobile virtual network operator (MVNO) which buys wholesale service from an MNO and sells on to its own customers.
Mobile ad hoc network - WANET, DARPA - mobile ad hoc network (MANET), also known as wireless ad hoc network [1] or ad hoc wireless network, is a continuously self-configuring, infrastructure-less network of mobile devices connected wirelessly
Mobile security - 1 Challenges of smartphone mobile security 1.1 Threats 1.2 Consequences 2 Attacks based on communication 2.1 Attack based on SMS and MMS 2.2 Attacks based on communication networks 2.2.1 Attacks based on the GSM networks 2.2.2 Attacks based on Wi-Fi 2.2.3 Principle of Bluetooth-based attacks 3 Attacks based on vulnerabilities in software applications 3.1 Web browser 3.2 Operating system 4 Attacks based on hardware vulnerabilities 4.1 Electromagnetic Waveforms 4.2 Juice Jacking 4.3 Jail-breaking and rooting 5 Password cracking 6 Malicious software (malware) 6.1 The three phases of malware attacks 6.1.1 Infection 6.1.2 Accomplishment of its goal 6.1.3 Spread to other systems 6.2 Examples of malware 6.2.1 Viruses and trojans 6.2.2 Ransomware 6.2.3 Spyware 6.2.4 Number of malware 6.3 Portability of malware across platforms 7 Countermeasures 7.1 Security in operating systems 7.2 Security software 7.3 Resource monitoring in the smartphone 7.4 Network surveillance 7.5 Manufacturer surveillance 7.6 User awareness 7.6.1 Enable Android Device Encryption 7.7 Centralized storage of text messages 7.8 Limitations of certain security measures 7.9 Next Generation of mobile security
Mobile computing - smart card, cellular telephone
A mobile phone, cell phone, cellphone, cellular phone, or hand phone, sometimes shortened to simply mobile, cell or just phone, is a portable telephone that can make and receive calls over a radio frequency link while the user is moving within a telephone service area.
Mobile technology - cellular telecommunications networks - 3g, 4g, operating systems
A cellular network or mobile network is a communication network where the last link is wireless. The network is distributed over land areas called "cells", each served by at least one fixed-location transceiver, but more normally, three cell sites or base transceiver stations -
5G - 5G is the fifth generation cellular network technology. The industry association 3GPP defines any system using "5G NR" (5G New Radio) software as "5G", a definition that came into general use by late 2018. Others may reserve the term for systems that meet the requirements of the ITU IMT-2020. 3GPP will submit their 5G NR to the ITU.[1] It follows 2G, 3G and 4G and their respective associated technologies (such as GSM, UMTS, LTE, LTE Advanced Pro and others) - health impact concerns , public safety
5G health risks are the the internet's new favourite conspiracy theory | public health concerns
1G - 1G refers to the first generation of wireless cellular technology (mobile telecommunications). These are the analog telecommunications standards that were introduced in the 1980s and continued until being replaced by 2G digital telecommunications. The main difference between the two mobile cellular systems (1G and 2G), is that the radio signals used by 1G networks are analog, while 2G networks are digital.
Linux for Pentester: pip Privilege Escalation - Python package manager, suid/setuid
Hunting for Privilege Escalation in Windows Environment
Cracked Tesla 3 Windshield Leads to $10,000 Bug Bounty
The Raspberry Pi 4 needs a fan, here's why and how you can add one | heatsink
Arduino from the Command Line: Break Free from the GUI with Git and Vim! | Linux Journal
Google is increasing Chrome security bug bounty rewards
Raspberry Pi 4 will probably need a fan no matter what - SlashGear
New EvilGnome Backdoor Spies on Linux Users, Steals Their Files - Russian Gamaredon hacking Group -
What Is Reverse SSH Tunneling? (and How to Use It)
Session Replay Attack | Barracuda Campus
Session Replay vs Session Fixation vs Session Hijacking - Stack Overflow
Cookies vs. sessions - Stack Overflow
Replay Attack - WS-Attacks
Welcome to WS-Attacks - Web services - reference
Cross-Site Request Forgery Prevention - mitigation - definitive cheat sheet
The Ultimate Guide to Understanding & Preventing CSRF
What is CSRF | Cross Site Request Forgery Example | Imperva
Preventing CSRF and XSRF Attacks
Is `curl {something} | sudo bash -` a reasonably safe installation method? - malicious download, malware spreading, https
How do AV scanners in VirusTotal check if a file is malicious or not and how trustworthy is its report? internal functionning - dynamic analysis
Difference between Certificate pinning and public key pinning - tls/ssl pinning
Difference between SSL pinning and certificate validating - public key pinning, tls
Pins and Staples: Enhanced SSL Security - http public key pinning obsolete with chrome, HPKP, HSTS, CT, Expect-CT, CRL, OCSP Stapling, Expect-Staple, Must-Staple, CAA, CSP, and the Secure Cookie attribute - OCSP
The fall of HTTP Public Key Pinning and rise of Certificate Transparency - HPKP
Industry Experts Agree: Don’t Use Key Pinning (HPKP)
Did google chrome kill HTTP public key pinning?
Exposure of ssh public keys, risks? - Information Security Stack Exchange
Session Authentication vs Token Authentication - Information Security Stack Exchange
If someone hacks my wi-fi password, what can they see and how? router hijacking - WPA/WPA2
xkcd: Password Strength - visual graphics
Where can I find good dictionaries for dictionary attacks? password cracking
How to recover a lost zip file password - brute force password cracking
Difference Between OAUTH, OpenID and OPENID Connect in very simple term? authorization, authentication
Dealing With x86 Segmentation Overlaps - seg:base
How to pass param to execve to execute cat a file in x64 Asm? - Reverse Engineering Stack Exchange
How should I approach reverse engineering this text encoding? - PS4, Vita gaming consoles
Video game console - gaming machines
Decompiling iPhone App - iOS - Reverse Engineering Stack Exchange
How do I get the location of the original audio/video file embedded on a webpage? - extract media/video/stream website
Introducing New Rails 6 Features | Toptal
A Deep Look at JSON vs. XML, Part 1: The History of Each | Toptal
Blockchain in Cybersecurity - IoT, quantum computing, bitcoin
What's the difference between "balance" and "unlocked balance"? - increased untraceability, anonymity
What is the difference between Tor, Tor Browser and torbrowser-launcher? - Tor Stack Exchange
Configure tor as proxy - fingerprinting, tor browser, socks
MQTT broker accessible from outside without opening port in firewall? - TLS, cloud, VPN
Is my Samsung Smart TV vulnerable to the "weeping angel" attack? - Internet of Things Stack Exchange
Weeping Angel Attack — CIA Vault 7 leaks
How do I avoid port forwarding when exposing IoT devices to the external Internet? - hole punching
M.2 NVMe x4 adapter card for PCIe x1 slot - SATA
Laptop without builtin webcam/ micro ? anonymity, privacy
A quantum computer that doesn't use entangled qubits has the same computational power as a classical one? - Toffoli gate
Maximum number of "almost orthogonal" vectors one can embed in Hilbert space - Welch bound, SIC-POVM
Why does the "Phase Kickback" mechanism work in the Quantum phase estimation algorithm? - Quantum Computing Stack Exchange
How would a quantum computer be used to solve Partial Differential Equations? - Quantum Computing Stack Exchange
What are the models of quantum computation? - annealing, adiabatic, Measurement-based quantum computation (MBQC) , unitary circuit model, quantum circuits with intermediary measurement, discrete time quantum walk
Building a quantum computer in simulation - simulator
What exactly are anyons and how are they relevant to topological quantum computing? - Quantum Computing Stack Exchange
What's different about a crontab reboot? - Raspberry Pi Stack Exchange
RPi 3 - Reduce power consumption - Raspberry Pi Stack Exchange
What's the difference between soft PWM and PWM - gpio, dma
Pulse-width modulation - PWM - pulse-duration modulation (PDM)
Building a 'Packet squirrel" using Raspberry Pi - packet capture, sniffing - MitM attacker
How do I change/recover my password? - passwd
Hackers breach 62 US colleges by exploiting ERP vulnerability | ZDNet
Kali NetHunter App Store - Android App Repository for Penetraton Testing and Forensics - f-droid fork - google play alternative
Microsoft opens Dynamics 365 bug bounty with $20k top prize | ZDNet
A Rust-based TLS library outperformed OpenSSL in almost every category | Benchmarks reveal better connection speeds and smaller memory footprint for Rustls library, compared to OpenSSL.
AI, quantum computing and 5G could make criminals more dangerous than ever, warn police | hacking tool
Police need intercept tools as mobile networks develop: Europol - state surveillance, privacy, 5G,4G, cellular networks
criminal use of technology - privacy, surveillance
Kazakhstan Begins Intercepting HTTPS Internet Traffic Of All Citizens Forcefully - state surveillance
How to Enable USB in VirtualBox - extension pack
93% of porn sites leak data to a third-party | industrial privacy violations
Slack data breach: Company resets thousands of passwords - bug bounty
GitHub - BishopFox/GitGot: Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets - security scanner - ,
Adware Is the Malware You Should Actually Be Worried About | WIRED
Hackers steal 7.5TB of data from Russian Intel Agency FSB's contractor - cyberwarfare, espionnage
The rising tide of ransomware requires a commitment to best practices | How fiscal responsibility and ransomware are impacting the market
Europe’s Galileo Satellite Outage Serves as a Warning | European GPS alternative
Microsoft: 70 percent of all security bugs are memory safety issues | ZDNet
No love lost between security specialists and developers | ZDNet
10 resources every sysadmin should know about | Opensource.com
System administrator responsibilities: 9 critical tasks | Opensource.com
GitHub - TH3xACE/SUDO_KILLER: A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo - /etc/sudoers, NOPASSWD
GitHub - horsicq/Detect-It-Easy: Program for determining types of files for Windows, Linux and MacOS - debugger, detect, unpacker, disassembler, reverse-engineering
What you need to know to be a sysadmin
How to apply 'release early, release often' to build a better brand | RERO
FaceApp privacy backlash - Facebook - Russian intelligence - cyberwarfare
What does "measurement in a certain basis" mean? bell state - spintronics, electronic spin - Quantum Computing Stack Exchange
What are the specific differences between an "emulator" and a "virtual machine"? - Stack Overflow
Simulation vs emulation vs virtualisation ....
How does virtualizing differ from emulation, in terms of structure? host/guest OSes interactions - Super User
What's the difference between an emulator and a virtual machine? - AskComputerScience
Real Device Vs Simulator Vs Emulator Testing: Key Differences
Simulator or Emulator? What is the difference? - Stack Overflow
"Family" apps use shared passwords for different usernames. How bad is it? - principle of authentication. By definition, the goal of authentication is to verify that a user is indeed a user, not his family member or a support technician. If someone else needs access, the should have access from their own account with their own password.
Private messaging for protesters - phone unlocking mitigation by setting up private app's own lock - Threema paid application - Information Security Stack Exchange
Is it a good security practice to force employees hide their employer to avoid being targeted? phishing, doxing, OSINT - Information Security Stack Exchange
How can I prevent a user from copying files to another hard drive? blacklist USB kernel module - modprobe - Information Security Stack Exchange
How do I disable copy permissions? - Unix & Linux Stack Exchange
Is it possible to prevent SCP while still allowing SSH access? - Server Fault
I found a password with hashcat, but it doesn't work - password hashes for MS Office 97-2003 are vulnerable to collision attacks
How can caller ID be faked/spoofed ? - Information Security Stack Exchange
Why shouldn't I use ECB encryption? - Cryptography Stack Exchange
Differences between the terms "pre-master secret", "master secret", "private key", and "shared secret"? - Cryptography Stack Exchange
Only 5 Nations Can Hit Any Place on Earth With a Missile. For Now. - warfare - The New York Times
Hypersonic Missiles Are Unstoppable. And They’re Starting a New Global Arms Race. - warfare - The New York Times
What size of initialization vector (IV) is needed for AES encryption? - Cryptography Stack Exchange
Second pre-image resistance vs Collision resistance - Cryptography Stack Exchange
Drone Crash in Iran Reveals Secret U.S. Surveillance Bid - cyberwarfare, drone, UAV - The New York Times
mind-controlled weapons link human brains and machines non-surgical - cyberwarfare | Military & Aerospace Electronics
embedded computing VPX trusted computing - TR E8x/lsd computer board has a six-core Intel Xeon E-2276ME processor running at 2.8 GHz with as much as 32 gigabytes of soldered-down DDR4 memory. - TPM, Boot Guard, Secure Guard
About a Sucuri RCE...and How Not to Handle Bug Bounty Reports - RCE Security
Potent Firefox 0-day used to install undetected backdoors on Macs – Ars Technica
OpenSSH gets protection against attacks like Spectre, Meltdown, Rowhammer, and Rambleed -OpenSSH to encrypt SSH private keys while at rest in a computer's RAM. - RAM attack, memory encryption
Everything you want to know about GCC – compiling argument -S, -c - linking process
How do you get assembler output from C/C++ source in gcc? -S argument - objdump
Microsoft Word - Macro malwares, Melissa Virus
Panel PC - industrial - capacitive/resistive touchscreen
5 Reasons Why You Shouldn't Buy a Smart TV - obsolete but interesting - security risks
Why The Internet of Things IoT Is The Biggest Security Nightmare
5 Security Concerns to Consider When Creating Your Smart Home - thermostat, smart tv, lightning system
Hack Attack: How To Keep Your Webcam Secure From Online Peeping Toms - security, hacking - RFID, Firewall, Firmware
6 Things to Check Before You Buy a Smart TV - Operating System - Roku, Android TV, Firefox OS, Tizen OS, and WebOS.
5 Smart TV Lies You Have Fallen For - security, hacking
RGB color model - three bytes code
How does hexadecimal color work? three bytes code - Stack Overflow
Capacitive vs. Resistive Touchscreens: What Are the Differences?
How to Get Past The Wall Street Journal Paywall in a Few Seconds
Does Column Width of 80 Make Sense in 2019? – Hacker Noon
Make Medium Readable Again — bypass membership wall - A browser extension to fix Medium
How to Read Medium Member-Only Articles for Free - bypass membership paywall
HTTP Headers for Dummies
Forget Google Translate: 3 Ways to Get an Accurate, Quick Translation - alternatives
GNU Assembler - gas, as - default backend for gcc
Using the GNU Compiler Collection (GCC): Extended Asm
Using gcc to Assemble Your Programs
How do I compile the asm generated by GCC? assembler - Stack Overflow
GIMPL, GNU Assembler gas, -S - c arguments, linker
Using GCC to produce readable assembly? -S, objdump - Stack Overflow
Why does x86 represent 32bit when x64 represents 64bit? x86_64, i386, amd64 - Server Fault
If 64-bit is x64 then why 32-bit is x86 instead of x32 in terms of computer architecture?
architecture - Difference between the i386 download and the amd64? x86, x86_64 - Ask Ubuntu
QNX - commercial Unix-like real-time operating system, aimed primarily at the embedded systems market
All the Secret (Or Not) Ways to Kill a Hypersonic Missile - warfare | The National Interest
China’s ‘Cloud Hopper’ hackers -
Stop Investigating Me! Or Else!The Late Show with Stephen Colbert3.2M views
My Resume Assessment by Monster
Singapore unveils framework to facilitate 'trusted' data-sharing between organisations | ZDNet
How to Find My DNS Server IP Address in Linux
GitHub - RedTeamOperations/PivotSuite: Network Pivoting Toolkit
Facebook debuts Libra cryptocurrency: a Bitcoin killer? | ZDNet
Mozilla’s 'Track This' lets you choose fake identity to deceive advertisers - privacy, browser fingerprinting
Is your phone listening to your conversations? Paranoid's guide to settings you can change | ZDNet
Why a high-tech border wall is as silly as a physical one | ZDNet
The Infrastructure Mess Causing Countless Internet Outages - Border Gateway Protocol
How Hackers Turn Microsoft Excel's Own Features Against It | WIRED
Bulgarian IT expert arrested after demoing vulnerability in kindergarten software | ZDNet
50+ Data Structure and Algorithms Interview Questions for Programmers
S.O.L.I.D: The First 5 Principles of OOD - tajawal - Medium
How to Make a Raspberry Pi Android TV Box
The 5 Best Raspberry Pi Smart TV Projects We've Seen
Running a virtual machine (VM) that can only connect through Tor - Tor Stack Exchange
How does Tor route DNS requests? - Tor Stack Exchange
What would it take to create my own Bitcoin exchange? - Bitcoin Stack Exchange
BitTorrent - Wikipedia
In simple terms, how does a BitTorrent client initially discover peers using DHT? - Super User
Question - Quora
Can bitcoins be counterfeited? - double spending attack
Is this a collision attack or a 2nd-preimage attack? - Bitcoin Stack Exchange
What are the differences between Bitcoin and Facebook Libra? security, double spending, privacy
How do I delete a Bitcoin full node from my hard drive? - Bitcoin Stack Exchange
What is the difference between simplewallet, wallet and wallet2? - Monero Stack Exchange
How to prove payment | Monero - secure, private, untraceable
GitHub - immunant/c2rust: C to Rust translation, refactoring, and cross-checking
Gmail confidential mode is not secure or private - ProtonMail Blog
Iran-Linked Hackers Said to Be Ready for Attacks on U.S. Targets – Even if real war doesn’t start, a cyberwar may soon be underway, experts say.
How Pro-Iran Hackers Spoofed FP and the News Media – Foreign Policy
i3 (window manager) - XCB vs Xlib
Windows Managers vs Login Managers Vs Display Managers Vs Desktop Environment - Xorg vs X11 - definitive comparison
What's the difference between desktop managers and display managers? - Desktop environment - X11 - definitive comparison
Display manager = login manager
Window Manager vs. Desktop Environment vs. Window System? What's the difference? - X11
What is the difference between a desktop environment and a window manager? - definitive explanation - X11
First-ever malware strain spotted abusing new DoH (DNS over HTTPS) protocol | ZDNet
Open Source Intelligence for Forensics (W41) - eForensics
Resource exhaustion in non-default RACK TCP stack - Recent ACKnowledgement
NVD - CVE-2019-11479 - DoS attack - Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service
NVD - CVE-2019-11478 - TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service DoS
NVD - CVE-2019-11477 - TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service DoS
La NSA assigne des développeurs au projet Coreboot, une alternative open source au BIOS et à l'UEFI, ne faudrait-il pas s'en inquiéter ?
coreboot - known as LinuxBIOS,[4] is a software project aimed at replacing proprietary firmware (BIOS or UEFI) found in most computers with a lightweight firmware designed to perform only the minimum number of tasks necessary to load and run a modern 32-bit or 64-bit operating system
Trusted Systems Research Group, formerly the National Information Assurance Research Laboratory, is the U.S. government's premier information assurance research and design center - Cryptography, Security, trusted computing
Libreboot - free-software project aimed at replacing the proprietary BIOS firmware found in most computers with an open-source, lightweight system designed to perform only the minimum number of tasks necessary to load and run a modern 32-bit or 64-bit operating system.
Coreboot vs. Libreboot - Intel IME, purism
Coreboot Versus UEFI – vs BIOS
Facebook aurait menti à propos de Libra ? Un expert de la blockchain en est convaincu, car c'est une cryptomonnaie centralisée dédiée aux plus riches
Moving Toward Permissionless | Libra
The Libra Blockchain - original paper
Permissioned vs. Permissionless blockchains: - Dustin D - Medium
The difference between permissionless and permissioned networks
What is the argument that practical quantum computers cannot be built? -
Classical Memory enough to store states up to 40 qubits quantum system? - Quantum Simulators
What is the computational basis? - Quantum Computing Stack Exchange
How do we physically initialize qubits in a Quantum register? - Quantum Computing Stack Exchange
Is there proof that the D-wave (one) is a quantum computer and is effective? - Quantum Computing Stack Exchange
How to derive a circuit from given equations? - Quantum Neural Networks where the authors discussed a new back propagation algorithm.
Why is the second register needed to define bit flip quantum oracles in a way that distinguishes between complementary oracles? - Quantum Computing Stack Exchange
VoIP Pentesting (W47) - Hakin9 - IT Security Magazine
Intro to SQL Window Functions | Toptal
Is Quantum Biocomputing ahead of us? - Quantum Computing Stack Exchange
How to implement the 4 Bell states on the IBM Q (composer)? - Quantum Computing Stack Exchange
Grover's Algorithm and its relation to complexity classes? - theory of complexity of search problems (also known as relation problems). FP, FNP, and FBQP - NP-completeness - definitive - unstructured search - CNF-SAT, HAMCYCLE, 3-COLOURING
Search problem - In computational complexity theory and computability theory, a search problem is a type of computational problem represented by a binary relation. - vs decision problem vs optimization problem
What are the differences between search problems, optimization problems, and decision problems? - Computer Science Stack Exchange
Significance of The Church of the Higher Hilbert space - quantum channels and quantum states
What countries are leading this "Global Quantum Computing Race"? - Quantum Advantage - cyberwarfare
Equivalent determinant condition for Peres-Horodecki criteria - Sylvester's Criterion
What does a "real" quantum computer need for cryptanalysis and/or cryptographic attack purposes? - Cryptography Stack Exchange
Is swap gate equivalent to just exchanging the wire of the two qubits? - Quantum Computing Stack Exchange
Can I damage my computer by mining bitcoin? - Bitcoin Stack Exchange
How do bitcoin exchanges work? - MtGox, Bitstamp, coinbase
How do you obtain bitcoins? - exchanges, brokerage
What's the consensus on using a non-networked VM as a cold wallet/airgapped computer? - ECDSA, side channels attack
"The Tor Browser Bundle should not be run as root" Why? - userland
Freelance : il n'a pas été payé, alors il a publié en open source le projet de son client, comment s'assurer d'être payé pour son travail ? Freelance work risks -
Cross debugging for ARM / MIPS ELF with QEMU/toolchain - Reverse Engineering Stack Exchange
Bypassing copy protection in microcontrollers using glitching - Reverse Engineering Stack Exchange
Is it possible to hijack a C++ DLL after it has been loaded into the memory space? How? - data race security risk, no sleep thread
Reverse Engineering (very) old DOS calculation program - Reverse Engineering Stack Exchange
How do I use "openssl s_client" to test for (absence of) SSLv3 support? - poodle vulnerability - nmap
Is it safe to give my email address to a service like haveibeenpwned in light of the publication of "Collection #1"? - Information Security Stack Exchange
GitHub - utkonos/lst2x64dbg: Extract labels from IDA .lst or Ghidra .csv file and export x64dbg database.
How to use to infrastructure as code | Opensource.com
Get modular with Python functions | Opensource.com
Singapore government to run another bug bounty | ZDNet
GitHub - lawrenceamer/0xsp-Mongoose: Privilege Escalation Enumeration Toolkit (ELF 64/32 ) , fast , intelligent enumeration with Web API integration . Mastering Your Own Finding
How to Install Nagios Monitoring Tool on RHEL 8
Yubico Security Keys with a Crypto Flaw - Schneier on Security
Smart home maker leaks customer data, device passwords | ZDNet
Facebook abused to spread Remote Access Trojans since 2014 | ZDNet
GitHub - sherlock-project/sherlock: 🔎 Find usernames across social networks
Is Your VPN Provider in a 14 Eyes Country? (What is 14 Eyes?) Choosing VPN
Firefox to Automatically Trust OS-Installed CA Certificates to Prevent TLS Errors
What makes a good code review in DevOps? | Opensource.com
Make Linux stronger with firewalls | Opensource.com
AppTrana — Website Security Solution That Actually Works - DDoS Solution, WAF, PCI compliant infrastructure
GitHub - sqlmapproject/sqlmap: Automatic SQL injection and database takeover tool
Ten years later, malware authors are still abusing 'Heaven's Gate' technique | Mid-2000s antivirus evasion technique is still popular even today, more than a decade later.
Google hopes to standardize robots.txt by going open source | Google wants to make the Robots Exclusion Protocol an Internet standard.
Google Releases Basic Homomorphic Encryption Tool - Schneier on Security
I Opted Out of Facial Recognition at the Airport—It Wasn't Easy | government surveillance, tracking, personal physical privacy
Cyberwarfare in space: Satellites at risk of hacker attacks | Old IT systems, supply-chain vulnerabilities and other technological issues leave military satellite communications open to disruption and tampering with potentially chaotic consequences
NASA hacked because of unauthorized Raspberry Pi connected to its network | NASA described the hackers as an "advanced persistent threat," a term generally used for nation-state hacking groups - cyberwarfare
DHS CISA warns of Iranian hackers' habit of deploying data-wiping malware | CISA also warns against other Iranian hackers' favorite techniques: password spraying, credential stuffing, spear-phishing.
Report shows failures at eight US agencies in following cyber-security protocols | ZDNet
US launches cyber-attack aimed at Iranian rocket and missile systems | cyberwarfare
Germany to publish standard on modern secure browsers | ZDNet
Germany and the Netherlands to build the first ever joint military internet | Germany and the Netherlands come together to build TEN (Tactical Edge Networking) = cyberwarfare
US wants to isolate power grids with 'retro' technology to limit cyber-attacks | SEIA bill, inspired by the 2015 cyber-attack on Ukraine's power grid, passes Senate - cyberwarfare
The Mac malware most likely to attack your PC this year | malware OSX.Dok
How does the CVE scoring system work? - TechRepublic
BlueKeep: Researchers show how dangerous this Windows exploit could really be | Researchers develop a proof-of-concept attack after reverse engineering the Microsoft BlueKeep patch.
Simplify Your Code With Rocket Science: C++20's Spaceship Operator <=>.
Use constexpr for faster, smaller, and safer code | Trail of Bits Blog
US Cyber Command issues alert about hackers exploiting Outlook vulnerability | Chronicle links the malware samples to Iran's APT33 group, which previously developed the infamous Shamoon malware - cyberwarfare
China's Border Guards Secretly Installing Spyware App on Tourists' Phones - The spyware, called Feng Cai (蜂采) or BXAQ, also scans infected Android devices for over 73,000 pre-defined files related to Islamic extremist groups, including ISIS recruitment fliers, bomb-making instructions, and images of executions - goverment surveillance on chinese muslims
'Web cleansing': China's Xinjiang residents forced to install surveillance apps on their mobile phones | government surveillance on Muslims
Parse arguments with Python | Opensource.com
GitHub - mozilla/mig: Distributed & real time digital forensics at the speed of the cloud -Mozilla InvestiGator
Great Firewall of China - Wikipedia
Multi-core processor - cpu
cpu architecture - Difference b/w hyper threading and multithreading? - Stack Overflow
Load balancing (computing) - Wikipedia
Why Fraudsters Have Shifted to 'Shimming' Attacks - payment card hacking
Scapy - python, packet manipulation - network monitoring/sniffing - scanning, tracerouting, probing, unit tests, attacks, and network discovery - libpcap/WinPCap/Npcap - wireshark
Tree (graph theory) - Wikipedia
Different between tree and graph? - Quora
algorithm - Breadth First Vs Depth First - DFS vs BFS
Depth-first search - DFS graph traversal
Breadth-first search - BFS graph traversal
Iterative deepening depth-first search - IDDFS - vs breadth first search BFS graph traversal
Lexicographic breadth-first search - Lex-BFS graph traversal
Memory-mapped file - Wikipedia
Demand paging - Wikipedia
Unix File System - UFS; also called the Berkeley Fast File System, the BSD Fast File System or FFS
Web cache - Wikipedia
What CIOs need to know about 5G | Wi-Fi 6 802.11ax
Expert DNS troubleshooting tips | HPE
Real-time Transport Protocol - Wikipedia
cURL - libcurl
DNS leak - Wikipedia
Whats the most anonymous active scanning technique? anonymity throughout attack
Address Resolution Protocol - ARP
Mitmproxy - How does it work
Netcat implementation in Python - scapy
Top 60 Linux Interview Questions & Answers
Top 50 Unix Interview Questions & Answers
How to get your dream job in tech: 100+ company guides | Interview processes
DEFINITIVE - Packet Traveling – articles on networking basics
Homomorphic Encryption Standardization – An Open Industry / Government / Academic Consortium to Advance Secure Computation
SQL Injection Prevention · OWASP Cheat Sheet Series
CheatSheetSeries/Password_Storage_Cheat_Sheet.md at master · OWASP/CheatSheetSeries · GitHub - salt length - sample code using Argon2 in Java and PHP
Introduction · OWASP Cheat Sheet Series - definitive web application security cheat sheets
Category:OWASP Top Ten Project - OWASP
nmap is exponentialy slow when scanning more ports - speed
Scan Time Reduction Techniques | speed
networking - How long would it take to perform different port scans on all 65536 ports? - speed
Techniques for improving Nmap port scan times - speed
VM Kali Linux - nmap why is so slow? - speed - scan time
Nmap Development: Speeding up scans that are slow due to wrong rate limiting detection - speed, scan time
How to perform a scan with nmap and some useful nmap tips for probing a computer. – syn scan -
Timing and Performance | scan time, speed
How Paige Adele Thompson Hacked Capital One Using A SSRF Attack ⋆ server side request forgery - AWS EC2, IAM - WAF Web Application Firewall -
Use SQLMAP To Bypass Cloudflare WAF And Hack Website With SQL Injection ⋆ 1337pwn
SQL Injection - OWASP
Testing for SQL Injection (OTG-INPVAL-005) - OWASP
Testing for NoSQL injection - OWASP
SQL injection - Wikipedia
Computer worm - malware
Defensive programming - secure coding
Secure coding - Buffer-overflow prevention - Format-string attack prevention - Integer-overflow prevention
Security bug - vulnerability
Host Discovery | Nmap Network Scanning
different behavior: "sudo nmap" vs just "nmap"? privileged vs unprivileged use of scan
Exploiting SUDO for Linux privilege escalation | So Long, and Thanks for All the Fish - Nmap NSE script - /etc/sudoers
Understanding Nmap Commands: In depth Tutorial with examples | Linuxaria
Linux PAM configuration that allows or deny login via the sshd server - linux hardening
Linux Detecting / Checking Rootkits with Chkrootkit and rkhunter Software - nixCraft
How To Write a Setuid Program
GitHub - jakejarvis/awesome-shodan-queries: 🔍 A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ 👩‍💻
GitHub - decalage2/awesome-security-hardening: A collection of awesome security hardening guides, tools and other resources
GitHub - coreb1t/awesome-pentest-cheat-sheets: Collection of the cheat sheets useful for pentesting - hacking - linux/windows local privilege escalation - nmap, vim - exploitation
GitHub - PreOS-Security/awesome-firmware-security: Awesome Firmware Security & Other Helpful Documents - secure boot, U-Boot, UEFI/BIOS, TPM, Trusted Execution Environment - microcode - JTAG - Evil Maid Attacks - Direct Memory Access DMA - LinuxBoot - PCIe PCIleech
different results using nmap with/without sudo - Information Security Stack Exchange
OS Detection | Nmap Network Scanning - TCP/UDP - TCP timestamp
How To Use Nmap to Scan for Open Ports on your VPS | DigitalOcean
security - Raw sockets need root priviliege - CAP_NET_RAW
A Guide to Using Raw Sockets - open source for you
Berkeley sockets - BSD/POSIX Sockets - raw socket - socket, bind, listen, accept, connect, gethostbyname, gethostbyaddr API functions
Application Threat Modeling - OWASP
Threat Modeling · OWASP Cheat Sheet Series
OWASP Top 10 - 2017 - Top Ten - attack vector, threat agent, impact - CWE mapping - 1.e SQL, NoSQL, OS command, Object Relational Mapping (ORM), LDAP, and Expression Language (EL) or Object Graph Navigation Library (OGNL) injection -
OWASP ASVS Assessment tool - OWASP
Web Application Penetration Testing for PCI - web-application-penetration-testing-pci-111066
CWE - Frequently Asked Questions (FAQ) - vs CVE
The Difference Between CWE and CVE - definitive
OWASP Internet of Things Project - OWASP IoT Top Ten/10
Why do static code analyzers cite CWE rather than CVE in their findings? - Information Security Stack Exchange
Disassembling CVE and CWE for No Fun and No Profit
OWASP Proactive Controls - OWASP
Source Code Analysis Tools - OWASP SAST Tool - static analysis
OWASP Risk Rating Methodology - OWASP Testing Guide v4 - Risks to businesses - related to but different from CVSS/CWSS - threat modeling
Code review Guide - OWASP - based on Top Ten/10 Vulnerabilities
Category:Threat Modeling - OWASP
Cybersecurity Framework | NIST
Download Microsoft Threat Modeling Tool 2016 from Official Microsoft Download Center
Vulnerability Classification Mappings - OWASP vs SANS CWE/25 vs WASC 24
Injection Flaws - OWASP
Radio - Cellular networks, satellite phone, 4G LTE, 5G - RFID - Submarine communication - definitive list of radio based technologies
Satellite radio - Wikipedia
Radio spectrum - Definitive Frequency bands classified by technological use - RFID - radars
List of cryptographers - Wikipedia
Kleptography - cryptoviriology
Cryptography - Wikipedia
Secure by design - Wikipedia
Secure by design - buffer overflows, format string vulnerabilities examples
CompCert - Formally verified C99 Compiler - Formal Verification by Coq Language
Snake oil (cryptography) - Unbreakable claims, one time pad
Adversary (cryptography) - Wikipedia
Cryptographic Hardware and Embedded Systems -- CHES 2015 - pdf - Free IT eBooks Download
Information Security, 2nd Edition - pdf - Free IT eBooks Download
OWASP Application Security Verification Standard Project - OWASP ASVS Certification
SEED Project - Hacking labs - software, network, web, system, mobile security labs - cryptography lab
SEED Project - Software security lab - buffer overflow, return to libc attack, environment variable, race condition, dirty cow, format string vulnerability, shellshock vulnerability
SEED Project - System Security Labs - Spectre, Meltdown
SEED Project - Web Security Labs - XSS, CSRF, SQL Injection
What are differences between VBoxVGA, VMSVGA and VBoxSVGA in VirtualBox? - Super User
What are the main differences between VirtualBox networking types?
Change keyboard layout on command line - key mapping/binding - dpkg-reconfigure keyboard-configuration
SEED Project - Hacking Labs - MD Collision Attack - RSA Public-Key Encryption and Signature - Secret Key Encryption, OpenSSL - PRNG - PKI
How do I install Guest Additions in a VirtualBox VM? -
windows 7 - Windows 7 on virtualbox and full screen mode -
SEED Software Security Lab - Exercises Walkthrough
SEED Project - Hacking Labs - Mobile Security - Android Repackaging - Android Device Rooting - Android VM
What is a clock cycle and clock speed/rate? - Stack Overflow
Clock Cycle - speed, CPU instructions
Instructions per cycle - IPC, commonly called Instructions per clock - clock rate/speed in hertz
Instructions per second - CPU Speed
Classic RISC pipeline - Wikipedia
Cycles per instruction - aka clock cycles per instruction, clocks per instruction, or CPI - CPU Speed
File Control Block - FCB, inode
Real-time clock - RTC, computer clock
What is a Computer Clock?
Data path - CPU, RAM, Bus - ALU Control Unit - Wikipedia
What Is a Payment Processor: 3 Important Terms to Know - Worldpay
What is the Difference Between a Payment Gateway and a Payment Processor? · Tidal Commerce
Stripe vs PayPal - Which Payment Gateway Should You Choose? (2018)
Payment Processing 101: Payment Processor, Payment Gateway & Merchant Account
Hacking Stripe Payments To Use In Any Country… - Almog - Medium
What Is a Payment Gateway? (And Why You Don't Need One) - PCI DSS Compliance
Top 10 PayPal Alternatives: Best Solutions Reviewed (August 2019) - Stripe
How to Accept Payments Online If You Can’t Use Stripe?
7 PayPal Alternatives for Freelancers to Collect Payments in WordPress - stripe
How to Develop Your Technology Idea | Smarterware
50 High Tech Business Ideas You Can Start Small - Small Business Trends
5 Steps to Help You Turn a Tech Idea Into Reality | Mental Floss
How to Develop a Great Startup Tech Idea - The Startup - Medium
Network interface controller - NIC, also known as a network interface card, network adapter, LAN adapter or physical network interface
Russian intelligence 'targets Tor anonymous browser' - Tor weaknesses, rogue exit nodes
How-are-Stripe-merchants-able-to-avoid-PCI-compliance-requirements-even-though-they-capture-the-card-details-on-their-own-checkout-page
Science Fiction Writers Helping Imagine Future Threats - cyberwarfare, counter terrorism
Leaked docs allege Huawei helped build North Korea's 3G wireless networks: Report | Cyberwarfare, state surveillance, wireless cellular communication
A new tool for measuring continuous learning | company building, management
What You Should Know About the Equifax Data Breach Settlement — Krebs on Security
$700 Million Equifax Fine Is Still Too Little, Too Late | WIRED
Siemens contractor pleads guilty to planting logic bomb in company spreadsheets | ZDNet
GitHub - bcapptain/dockernymous: A script used to create a whonix like gateway/workstation environment with docker containers - anonymity - privacy -
Hackers Expose Russian FSB Cyberattack Projects - cyber warfare
What makes a secure & successful website: A Guide - company wise - cyber security management
GitHub - DarkSecDevelopers/HiddenEye: Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]
Why Microsoft’s BlueKeep Bug Hasn’t Wreaked Havoc—Yet | WIRED
GitHub - ManhNho/shellsum: A defense tool - detect web shells in local directories via md5sum
Meet IRpair & Phantom; powerful anti-facial recognition glasses - anti state surveillance tool, iris recognition
GitHub - d4rk007/RedGhost: Linux post exploitation framework designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.
New Attack Lets Android Apps Capture Loudspeaker Data Without Any Permission - Spearphone: A Speech Privacy Exploit via Accelerometer-Sensed Reverberations from Smartphone Loudspeakers."
Get going with EtherCalc, a web-based alternative to Google Sheets | self hosted
Citizen Lab: WeChat’s real-time censorship system uses hash indexes to filter content | The filtering systems also censor content that are not critical of the Chinese government - state surveillance, MD5 hashing primitive
Hackers Made an App That Kills to Prove a Point | IoT, medial devices security, embedded
Zoom App Vulnerability - Schneier on Security
Meet the World’s Biggest ‘Bulletproof’ Hoster — “Yalishanda,” “Downlow” and “Stas_vl”
GitHub - hfiref0x/UACME: Defeating Windows User Account Control - abusing built-in Windows AutoElevate backdoor.
Remote code execution vulnerability in VLC remains unpatched | ZDNet
Oracle: China's internet is designed more like an intranet | China's internet could continue to operate as a national intranet in the case of a cyber-attack or foreign intervention - cyber warfare, great firewall
Communications satellite - Wikipedia
Satellite phone - Wikipedia
cell site, cell tower, or cellular base station is a cellular-enabled mobile device site where antennae and electronic communications equipment are placed—typically on a radio mast, tower, or other raised structure—to create a cell (or adjacent cells) in a cellular network.
satellite telephone, satellite phone or satphone is a type of mobile phone that connects to other phones or the telephone network by radio through orbiting satellites instead of terrestrial cell sites, as cellphones do.
The 7 Best Satellite Phones for World Travel - satphones
Question - Quora
Mobile Network Standards Guide - gsm, CDMA, LTE, 2g, 3g, 4g
The Security of Cellular Connections - network, encryption, 4g lte
4g LTE wireless connections used by billions aren’t as secure as we thought | https,strict transport security STS, DNS, 5G
Are phone calls on a GSM network encrypted? - GSM uses 64-bit A5/1 encryption - state surveillance, privacy, 2g, 3g, 4g
How much protection and privacy does a satellite phone provide as opposed to a smart phone?
New attack can now decrypt satellite phone calls in "real time" | The paper advances earlier research from 2012, which reverse engineered a popular satphone encryption - security
Don't Trust Satellite Phones: A Security Analysis of Two Satphone Standards - encryption
On cellular encryption – A Few Thoughts on Cryptographic Engineering - network, gsm, 3g, 4g, LTE
A Few Thoughts on Cryptographic Engineering – Some random thoughts about cryptgraphy - resources
How does Apple (privately) find your offline devices? – A Few Thoughts on Cryptographic Engineering - geolocation, privacy, physical location, phone tracking
IMIX: In-Process Memory Isolation EXtension - security
Secure, Efficient In-Process Memory Isolation | security
Memory Protection: Kernel and User Address Spaces - security
LXC - Linux Container - OS Level virtualization
What is the difference between Docker, LXD, and LXC - Unix & Linux Stack Exchange
Where can I find 100% working Netflix cookies daily? hack
How-can-I-use-cookies-to-watch-Netflix-on-mobile-phones
Phishing Attacks Exploit Popularity of Netflix, AMEX
How can I watch Netflix with a friend online? - Web Applications Stack Exchange
How I Hacked Netflix users & Use it free forever - Cookie injection,Reuse of cookie will lead to privilege escalation and bypass of Basic Netflix plans
Netflix fixes potentially devastating Linux SACK vulnerability - selective acknowledgement - kernel panic, TCP implementation
Brave vs Tor - brave_browser - fingerprinting
How well Tor protects against fingerprinting? - Information Security Stack Exchange
Will Monero ever move to Proof of Stake (PoS)? - proof of work PoW, mining
How to store passwords in Tor Browser? secure password storage - Tor Stack Exchange
HTML 5 canvas Imagedata Extraction, what does it actually mean? fingerprinting
DNS in Tor and Tor Browser - leaks, torsock, CLI, VPN, socks5
Is Bitcoin PoW actually SHA256 + Merkle generation? Or have I misunderstood coinbase/append? hash grinding, merkle root
To what extent does asymmetric cryptography secure bitcoin transactions? - Bitcoin Stack Exchange
What are the potential security issues when running a Lightning Node on my home network? - tor, htlc
What happens when i change the encryption password of Bitcoin-Core wallet - master key, random passphrase - secure storage
Accessing IoT device from remote server using IP address - UPnP, reverse ssh tunnel, nat, mqtt broker
Solution for Outdoor Geolocation - gps tracker, raspberry pi
MQTT-SN using any encryption? - security
Home energy monitor - in home display
Which backend database is suitable for the IoT implementation - Internet of Things Stack Exchange
What is the difference between a DDoS attack and a PDoS Permanent DoS attack? brickerbot - Internet of Things Stack Exchange
Which cheap microcontroller with Wi-Fi to choose for IoT endpoint devices? - TCP ip stack implementation
How to create quantum circuits from scratch - quantum gate
QUANTUM COMPUTING - A Gentle Introduction - Eleanor Rieffel and Wolfgang Polak - definitive course
How many operations can a quantum computer perform per second? - Quantum Computing Stack Exchange
How does measurement of one qubit affect the others? - Quantum Computing Stack Exchange
Ubuntu Forensics - Sleuth Kit, Bulk Extractor, Exiftool, dd, mount, grep, find commands, eCryptfs,John the Ripper, firefox
Will These JavaScript Frameworks Topple Vue.js, React, and Angular? | Toptal
Scapy - packet manipulation tool for computer networks. It can forge or decode packets, send them on the wire, capture them, and match requests and replies. It can also handle tasks like scanning, tracerouting, probing, unit tests, attacks, and network discovery.
Does a hash function have a Upper bound on input length? - backdoor resistance, Merkle-Damgård
If hash functions append the length, why does length extension attack work? - Cryptography Stack Exchange
Can error correction and detection be done without adding extra bits? - hamming code, bch, pigeon hole principle
Does larger key size mean larger data size in asymmetric encryption? - pkcs, oaep, modulus
Are "non-mathematical" encryption algorithms comparably secure against brute force key recovery? - Cryptography Stack Exchange
Does anyone sell a proprietary symmetric encryption alogirthm? - Cryptography Stack Exchange
What are the advantages of Time based TOTP over Hmac based HOTP? - Cryptography Stack Exchange
How is SHA1 different from MD5? - Cryptography Stack Exchange
Can you explain Bleichenbacher's CCA attack on PKCS#1 v1.5? - chosen cipher text attack, attack scenario
How to find modulus from a RSA public key? - base64
Cross-Origin Resource Sharing (CORS) - HTTP | MDN
Understanding CORS - Bartosz Szczeciński - Medium
Low Orbit Ion Cannon - ddos tool
Use a Load Balancer as a First Row of Defense Against DDOS - HAProxy Technologies
Leveraging the Load Balancer to Fight DDoS - mitigation
How does CORS prevent XSS? - Information Security Stack Exchange
maustin.net | Facebook XSS via Cross-Origin Resource Sharing CORS
TCP vs HTTP(S) Load Balancing. - Martin Ombura Jr. - Medium
"This used to be my phone number" - TOTP, multi factor authentication, 2FA
The most secure way to handle someone forgetting to verify their account? - account verification, authentication password-cracking account-security oauth credentials
Is encryption still applied if you ignore the SSL certificate warning for self-signed certs? mitm - Information Security Stack Exchange
Difference between non-repudiation and plausible deniability - Information Security Stack Exchange
At which point can a system be compromised when downloading archived data from an untrusted source? unpacking archive, zip bomb
Generating a PIN from cryptographic bytes - prng, csprng
Can a SIM card be tracked without cell phone and battery? - cellular network, gsm
Is single quote filtering nonsense? - sql injection, input validation
How do I test for SQL injection vulnerabilities on a site with input fields? - Information Security Stack Exchange
HTTPS icon red and crossed out - Chrome browser - web browsers security - mitm
Optimizing code to use less Flash Memory and SRAM - memory footprint, optimization, embedded coding
Memory footprint - segments, jvm, symbol table
Can I program for Arduino without having a real board? simulator - Arduino Stack Exchange
Is this a safe way to identify someone through a QR code for a purchase? - Information Security Stack Exchange
How can I create an encrypted QR code, and how does it work? password protection
QR Droid Zapper | Encrypted QR Codes: Share secret messages
Secure / Encrypted QR Codes - URL encoding redirecting to online authentication service
Some kind of "encrypted" QR codes? - out of the box thinking
How to dump flash memory with SPI? - desoldering, one time programmable memory OTP
How do I reverse engineer .so files found in android APKs? - shared object libraries, ARM, JNI
Objdump - How to output text (eg ASCII strings) alongside assembly code? - elf32
Is there a reason why I should not use the HaveIBeenPwned API to warn users about exposed passwords? - NIST SP 800-63b
Sextortion with actual password not found in leaks - hibp limits
How can Paypal know my card is being used in another account? PCI DSS
How to Trust a Self-Signed Certificate - Information Security Stack Exchange
Can a criminal fake the use of a PIN in a chip and pin credit card transaction? - mitm attack
Why would you not permit Q or Z in passwords? - old phones keyboard limitation
ELK to AWS: Why and How to Migrate | Toptal
WordPress Development Best Practices: The PHP Back End | Toptal
What is one of the best features C++20 will implement? consteval
GDPR is eroding our privacy, not protecting it
Questions About the GDPR That You Were Too Shy to Ask - Simple Talk
Reading from EEPROM and combining - Arduino Stack Exchange
Modbus RTU controller monitoring with arduino and RS485 module - write buffer system call
How does the reset button work on the Arduino? - Arduino Stack Exchange
What can I do if I run out of Flash memory or SRAM? - eeprom, embedded code optimization
Programming an Arduino using Python, rather than C/C++ - Arduino Stack Exchange
PenTest: DDoS Attacks and Protection - shellshock, threat modeling, active directory, misconceptions, WiFi, mitm
What Is eMMC Memory? embedded MultiMediaCard
MultiMediaCard - MMC, ssd, flash
Librem 5 private Smartphone - Final Specs Announced – Purism - privacy focused alternative, cellular phones
The Roots of Boeing’s 737 Max Crisis: A Regulator Relaxes Its Oversight - software bug
You’re very easy to track down, even when your data has been anonymized - MIT Technology Review - anonymity, privacy
Code talker - cryptolinguistics
Spoken encryption - cryptolinguistics
Zero-Knowledgeness of Fiat-Shamir heuristic - random Oracle model
When encrypting twice with two separate keys, can a single key decrypt both steps? - Cryptography Stack Exchange
Is $f(K, f(K, x))$ a pseudorandom function? - Cryptography Stack Exchange
ECDSA: Why is SigningKey shorter than VerifyingKey - Cryptography Stack Exchange
AES256-GCM - can someone explain how to use it securely (ruby) - Cryptography Stack Exchange
How can I use asymmetric encryption, such as RSA, to encrypt an arbitrary length of plaintext? - Cryptography Stack Exchange
Is secp256r1 more secure than secp256k1? - Cryptography Stack Exchange
Question - Quora
A Software Defined Radio Tutorial: Receiving the ISS and Hams with an RTL-SDR | Toptal
A Dart Language Guide for C# and Java Developers | Toptal
A basic question on circuits and matrix representation - Quantum Computing Stack Exchange
Why doesn't the Gottesman-Knill theorem render quantum computing almost useless? - Quantum Computing Stack Exchange
Visualization of Quantum Circuits when using IBM QISKit - Quantum Computing Stack Exchange
How are quantum gates implemented in reality? - CNOT
What exactly is an oracle? black box - Quantum Computing Stack Exchange
Will hackers turn the Boeing 787 Dreamliner into a flying nightmare? | BetaNews
Answer - Quora
beoutQ - bein sport piracy
Apple is offering a $1 million reward to anyone who can pull off a specific iPhone hack - bug bounty, iOS
Hackers with a purpose: the life of a white-hat hacker - IoT, smart home, smart car
How to Build Your Own Penetration Testing Dropbox Using a Raspberry Pi 4 — openvpn
Google Warning: Tens Of Millions Of Android Phones Come Preloaded With Dangerous Malware
Solar Powered Raspberry Pi Camera (Electronics) — Kaspars Dambis
What a security researcher learned from monitoring traffic at Defcon - CNET
Netflix Gratuit en 2019 : méthodes légales et injection de cookie > Web & Tech
Payments Security Engineering: One of the Most Exciting Fields in Technology Today
How Amazon Web Services runs security at a global scale | security operations center SOC
Evaluating the NSA's Telephony Metadata Program - government surveillance
In fighting deep fakes, mice may be great listeners - BBC News
https://opensource.com/article/19/8/dig-binary-files-hexdump
Hackers Can Turn Everyday Speakers Into Acoustic Cyberweapons | WIRED
Watch a Drone Take Over a Nearby Smart TV | WIRED
Over 40 Drivers Could Let Hackers Install Persistent Backdoor On Windows PCs
GitHub - david942j/seccomp-tools: Provide powerful tools for seccomp analysis
Researchers find security flaws in 40 kernel drivers from 20 vendors | ZDNet
Hackers Could Decrypt Your GSM Phone Calls | cellular network encryption, security
A Remote-Start App Exposed Thousands of Cars to Hackers | WIRED
Election Systems Are Even More Vulnerable Than We Thought | voting machines
How to Install Apache with Virtual Hosts on Debian 10
Hackers Take on Darpa's $10 Million Voting Machine | WIRED
This Tesla Mod Turns a Model S Into a Mobile 'Surveillance Station' | anti theft anti stalking DIY system
Inside the Hidden World of Elevator Phone Phreaking | WIRED
The Security Risks of a Smart City
Goodbye BIOS, hello UEFI | MBR, GPT
Demystifying UEFI, the long-overdue BIOS replacement - ExtremeTech
TUN/TAP - virtual network kernel interface
How to prepare for a security engineer interview. - Eray Mitrani - Medium
How to convert MBR to GPT drive to switch BIOS to UEFI on Windows 10 | Windows Central
Integrated vs. Dedicated/Discrete Graphics Card: 7 Things You Need to Know
Run a program on your dedicated AMD graphics card GPU on Linux | Stardust | Starbeamrainbowlabs
Integrated vs. Dedicated/Discrete Graphics Card: Which to Use and Why - Make Tech Easier
Ireland is becoming a European security hub | UCD Centre for Cybersecurity & Cybercrime Investigation - jobs, companies
PenTest: DDoS Attacks and Protection - mitigation
10 Essential MongoDB Interview Questions and Answers
Open Source Intelligence for Forensics - OSINT
iOS vs. Android Design: What to Avoid | Toptal
Making Your First GraphQL API | REST
learning/Mathematics.md at master · awalterschulze/learning · GitHub - definitve list of fundamental and advanced mathematics course - algebra, topology, group theory
A Programmer’s Regret: Neglecting Math at University - mathematical foundations of computer science
GitHub - rossant/awesome-math: A curated list of awesome mathematics resources
Stripe Interview Questions | Glassdoor
Guide: How to Get a Job at Stripe - interview process
Stripe: Recruiting, hiring, and managing talent - interview
What is the engineering interview process like at Stripe?
Stripe Interview - Blind
Preparing for Tech Interviews with Paul Carleton of Stripe [INTERVIEW]
Stripe Data Science Interview Questions - Acing AI - Medium
Cracking The Code: Why Stripe Defies A Tech-Interview Norm
I interviewed at six top companies in Silicon Valley in six days, and stumbled into six job offers - stripe
Questions I'm asking in interviews - Julia Evans
Stripe: infrastructure/technical details - interview preparation
Stripe: Jobs - interview preparation
Point of sale POS - Point of purchase POP - payment security
A guide to PCI compliance
Stripe Payments: A complete payments platform, engineered for growth | France
Integration Security Guide | Stripe
PCI Compliance Validation for Stripe Terminal : Stripe: Help & Support
Do I Need PCI Compliance with Stripe? Question and Answer
How do I legally become PCI compliant and use Stripe? - Stack Overflow
How is the Stripe payment method PCI compliant?
C-Based Toolchain Hardening · C/C++ Compilers
VirtualBox - dkms, guest additions
Oracle® VM VirtualBox® - Official Manual - Documentation
15.04 - Create a shared VirtualBox hard disk - Ask Ubuntu
command line - How could I list all super users? - sudoers, sudo users
etc/default/keyboard not taken into account at boot - keyboard layout change - key mapping/binding - definitive gsettings method
Xorg/Keyboard configuration - setxkbmap
keyboard - Change from qwerty to azerty in command line - keyboard layout - key mapping/binding
cryptography - How is a cypher algorithm verified? - provable/information-theoretic/uncoditional/unbreakable cryptosystems/security - P = NP - definitive answer
cryptography - Most secure password hash algorithm(s)? - provable - unconditional/information-theoretic/unbreakable security/cryptosystem - SHA-256/512 - Whirlpool - GPU, FPGA - PBKDF2, scrypt,
cryptography - What are the realistic, and most secure crypto for Symmetric, Asymmetric, Hash, Message Authentication Code ciphers? - Information Security Stack Exchange
web application - How secure are sha256 + salt hashes for password storage - Information Security Stack Exchange
How to find out when Debian or Ubuntu package installed or updated - nixCraft
NMAP CHEAT-SHEET (Nmap Scanning Types, Scanning Commands , NSE Scripts)
ip - Does nmap trace back to you? - anonymity throughout attack - SYN Scan, half open connections - Idle Scan - avoiding detection
Security Tip: Avoid Detection with nmap Port Scan Decoys - anonymity throughout attack
Nmap: The Art of Port Scanning - TCP connect vs TCP SYN vs TCP FIN vs Fragmentation vs TCP reverse ident vs FTP bounce attack vs UDP/ICMP port unreachable vs UDP recvrom/write vs ICMP echo - definitive breakdown of nmap scanning techniques
SQL Injection SEED Lab - DNS, Apache Server, Virtual Host Configuration - MySQL
Beyond SQLi: Obfuscate and Bypass - Advanced SQL Injection Techniques - Bypassing WAFs
Greedy Algorithm and Dynamic Programming - Cracking The Data Science Interview - Medium
PulseAudio - Debian Wiki - sinks, sources
audio - Change PulseAudio Input/Output from Shell/CLI ? command line - pactl, pacmd - source, sink
SEED Project - Network Security Labs - Packet Sniffing, Spoofing - TCP IP - Heartbleed - Local DNS Attack - Remote DNS Attack - Firewall Exploration - Firewall Evasion - VPN
DOUBLE QUERY INJECTIONS DEMYSTIFIED
SQL Injection in INSERT Query | Secure Belief
Nested SQL Injections (Example) -
Secure Apps By Preventing PHP SQL Injection in 2019
Writing Subqueries in SQL | SQL Tutorial - Mode Analytics
SQL Tutorial
SQL Injection Tutorial - definitive guide
SQL vs NoSQL: The Differences — SitePoint
What is SQL Injection | SQLI Attack Example & Prevention Methods | Types of attacks
Digital wallet - vs cryptocurency wallet
Cossack Labs / Preventing SQL Injections - When WAF’s Not Enough - in-code mitigations vs WAF vs Dedicated SQL Firewall - definitive defense strategies
Improving Web Application Firewalls to detect advanced SQL injection attacks - document
Category:OWASP Best Practices: Use of Web Application Firewalls/Version 1.0.5 - OWASP - sql injections
The High Vulnerability With WAF - Web Application Firewalls limitations - security - sql injection
Complete Web Application Firewall Definitive Guide - devconnected — DevOps, Sysadmins & Engineering - WAFs solutions comparison
Unconditional Security of Cryptosystem: A Review and Outlook - 554-562.pdf
Introduction to Provable Security - ascrypto2013_alejandrohevia.pdf
Provable Security - Introduction - Asymmetric Cryptography•Computational Assumptions•Security Proofs•Encryption and Signature•Random-Oracle Model
What is the relation between computational security and provable security? definitive breakdown
What's the difference between perfect security/secrecy and unconditional security? - Cryptography Stack Exchange
Unconditional Security in Quantum Cryptography
Unconditional Security - OTP Proof - RNG Random Bit Generation - Message Authentication Code MAC
Cryptographic Engineering - Unconditional Security of Symmetric Cryptosystems - Complexity Classes P, NP, problem reduction - One Way functions, asymmetric cryptography - Secure Random Number Generation, Cryptographically Secure CSPRNG
encryption - How can a cryptosystem be unconditionally secure? - Cryptography Stack Exchange
Perfect Secrecy - Unconditional Security - One Time Pad OTP
Introduction to Cryptography - academic course - Perfect Secrecy - One-Way Functions - Hardness Amplification Theorem - OWF and Multiplication - OWFs and Hard-Core Bits Hard-Core Bits from any OWF - Computational Indistinguishability - Indistinguishability and Pseudorandomness - Pseudorandom Generators - Probabilistic Random Functions - Multi-Message Security - Public Key Encryption - PKE and Zero Knowledge - Zero Knowledge Proofs - Authentication - Secure Computation
Perfect Secrecy - p erfect adversarial indistinguishability
One Time Pad - Security Proof - perfect secrecy/security -
CMSC 456 --- Cryptography - academic course
Journal of Cryptology - All Volumes & Issues - academic resources
Conditionally-perfect secrecy and a provably-secure randomized cipher - shannon
One-time Pad and Perfect Secrecy
Cryptography - academic course
EVERLASTING SECRECY BY EXPLOITING EAVESDROPPER’S RECEIVER NON-IDEALITIES - information-theoretic/unconditional security
Shannon and Perfect Secrecy -
Perfect Secrecy, One-time Pad
one time pad - Simply put, what does “perfect secrecy” mean? - Informtation theoretic security
Computational Indistinguishability, Pseudorandom Generators - cryptography
perfect-secrecy - one time pad proof - probability
Fundamental problems in provable security and cryptography - random oracles, zero knwoledge proof - code obfuscation - definitive article
Perfect Secrecy/Unconditional Security - vs Provable security - perfect indistinguishability - definitive course
What is perfect secrecy? Information-theoretic/unconditional security
Gilbert Vernam - Vernam Cipher/One-Time-Pad - Shannon Characterization of Unbreakable/Unconditional/Information-theoretic Cryptosystem - One Time Pad - CSPRN
CS Career Hackers | Interview preparation
Analyzing Packed Malware - anti packing technique - malware analysis
GitHub - checkcheckzz/system-design-interview: Software Engnieering - System design interview for IT companies
node js vs python vs ruby restful api at DuckDuckGo
SQL Injection 101: How to Avoid Detection & Bypass Defenses - advanced sql injection - mitigation
SQL Injection 101: Common Defense Methods Hackers Should Be Aware Of « Null Byte :: WonderHowTo
SQL Injection 101 « Null Byte :: WonderHowTo
SQL Injection - Understand and Prevent SQL Injection Attacks - mitigations
Network-Scale Mitigation of High-Volume Reflection/Amplification DDoS Attacks - anti spoofing, uRPF, ACLs, DHCP Snooping, IP Source Guard, Cable IP Source Verify - Comparison of common Reflection/Amplification Vectors/Services chargen, DNS, SNMP, NTP, SSDP for UPnP
Globbing
Using an approximated One-Time Pad to SecureShort Messaging Service (SMS) - GSM, cellular network security
One-Time Pad (OTP)
Why exactly is it important to only use a one-time pad (OTP) key once? - Quora
The one time pad and the many time pad vulnerability - Stefano Ottolenghi's Place
One Time Pad - does it work for long plain texts? Usage advice - in memory attack
Worse is better - Wikipedia
Can a startup with new idea compete with market giant companies like Google and Facebook? What are recommended steps I can take regardless of having an idea patent? - tech idea, competition
It's Hard to Compete With Tech Giants Like Google and Amazon -- But It Can Be Done - tech idea, competition
Lessons From Successful Entrepreneurs on How to Beat the Competition - tech idea, competition
All Startup’s have competition: Startup Survival Guide - tech idea, competition
Council Post: 12 Ways For A Tech Startup To Survive In A Competitive Industry - tech idea, competition
A Hand-Picked Overview of the 30 Best Startup Pitch Competitions of 2019 | GrowthMentor - tech idea, competition
The Startup Competitions You Can't Afford to Miss in 2019 - valuer - tech idea, competition
Top 5 emerging information security technologies - security tech idea
6 Innovative Technologies Designed To Improve Our Safety - security tech idea
14 incredibly useful things you didn’t know Google Drive could do - security tech idea - IoT
Mozilla ranks dozens of popular ‘smart’ gift ideas on creepiness and security | smart home IoT privacy violations - security
Engineering Mathematics Tutorials - basics, fundamentals
C++17 header-only dynamic bitset : cpp
Precondition - algorithm
Correctness of algorithm
Representational state transfer - REST - Restful APIs - Hypermedia as the engine of application state (HATEOAS) - scalability - vs SOAP
Uniform Resource Identifier - URI - vs URL vs URN
Introduction · Everything curl - libcurl internal - how it works internally
Longest prefix match - Wikipedia
UTN #23: To the BMP and Beyond - Basic Multilingual Plane - Unicode
WebSocket - vs HTTP
Popular Attacks on Web Applications - security - CSRF, Cross Site Ajax, XSS, Data Filetring, ClickJacking, SQL injection, countermeasures - finding similarities - academic video course
The Set-UID Privileged Programs - academic video course - PATH Attack, IFS Attack, Execution Attack, execve, library interposition - setuid - defenses/mitigation -
Computer Security Lecture Videos and Lab Exercises - academic course
The Format String Vulnerability - printf - academic video course
The Race Condition Vulnerability and Countermeasures - academic video course
Computer Security - academic video course
Environment Variable and Set-UID/setuid Lab - academic challenge
Environment Variable and setuid privileged programs - Environment Variable and Set-UID/setuid Lab - SEED Labs academic video course
Fast memcpy in C - implementations based on CPU architectures - memory access - FPU floating point unit - Deff's Device
SQL Injection Attack Lecture - seed labs academic video course
Unexpected features in Acrobat Reader 7 - linux - privacy violations - acroread - Javascript
Find Duplicates of array using bit array - GeeksforGeeks
18.04 - How can I create a partition? linux command - mkfs
NTFS - New Technology File System - journaling, hard links, scalability - Security, ACLs, DACL, Mandatory Access Control, Encryption
Collision (computer science) - clash - hash value, checksum, fingerprint, cryptographic digest - attack, security
Index mapping - direct addressing, or a trivial hash function - lookup key
Hash table - Unordered associative array - Time/Space complexity - denial of service by collision attacks against server's hash table - security - Perfect hash functions - collision resolution, birthday problem
Birthday problem - pigeon holes
stl - C++ equivalent of StringBuffer/StringBuilder? - vs Java - mutable/immutable string
The World Has No Room For Cowards — Swatting attack on Krebs
usermode - User Mode vs Userland - definitive
AMD Platform Security Processor - AMD Secure Technology - equivalent of Intel Managemen Engine IME
logic - How can I correct my wrong Intuition that $\forall \, x \, \in \,\emptyset : P(x) \quad $ is false? definitive Vacuous Truth / Statement
17-654 Analysis of Software Artifacts Syllabus - academic course, security, program verification, static analysis, profiling
SQL Injection SEED Lab - DNS, Apache Server, Virtual Host Configuration - MySQL
programming - Is arduino a single board computer? - SBC vs microcontrolelr MCU
surveillance - Does the telecom provider need physical access to the SIM card to clone it? - SIM cloning - cell phone, cellular
What private browsing reveals about you - incognito mode, dns cache
Find Out Which Sites Users Have Accessed In Private Browsing Modes - dns cache windows, incognito mode
How to Really Browse Without Leaving a Trace - dns cache, flash cookies - private browsing, incognito mode - windows
Windows Tools, Help & Guides » Blog Archive » Check which Sites Have Been Visited (Even if Private Browsing Mode is Used) - dns cache, windows - incognito mode
networking - DNS caching in linux - cache - debian - OS level cache - dnsmasq
Local DNS caching - linux debian OS level cache - dnsmasq
networking - How can I find the IP address of my router? LAN
Simultaneous multithreading - SMT
Why would image resources loaded from different origins triggering HTTP authentication dialogs be harmful? - Information Security Stack Exchange
algebra precalculus - Zero to the zero power – is $0^0=1$? - IEEE standard
Backdoor (computing) - Wikipedia
Fortify Software - DAST/SAST - secure coding - source code auditing
Lsof – A Unix Utility You Should Know About - swiss army knife of unix debugging
An lsof Primer | security, sysadmin linux tool
How to use lsof(List Opened Files) in a C/C++ application? - unix
c - Which linux system call is used by ls command in linux to display the folder/file name? - openat(), getdents(), opendir(), readdir(), closedir()
Arp Cache Poisoning and Packet Sniffing - ettercap
disassembly - How to find main() in binary? - Reverse Engineering Stack Exchange
How To Use The Bridgefy Offline Messaging App - bridgefy - mesh network
Creating an offline messaging app with the Bridgefy SDK
Hack Like a Pro: Cryptography Basics for the Aspiring Hacker « Null Byte :: WonderHowTo
Ident protocol - RFC 1413 - user identification of TCP service - identd daemon
IRC takeover - attack - smurf DDoS
IRC services - takeover mitigation
Malleability (cryptography) - homomorphic encryption
Deniable authentication - OTR Off-The-Record Messaging
List of Internet Relay Chat IRC commands - Wikipedia
New documents reveal which encryption tools the NSA couldn't crack - snowden, privacy, anonymity - PGP, HTTPS, AES
Pidgin - IRC
So you want to write a package manager - sam boyer - Medium
Request for Comments - RFC
Socialist millionaires - Off-the-Record OTR Messaging protocol - zero knowledge proof
bash - Confused about the behavior of asterisk/star in ls - l command - Unix & Linux Stack Exchange
security definition - Why is AES considered to be secure? vs RSA - provable security - mathematical problem resolution - problem reduction
Valgrind Docs - documentation - memory leaks detection
Zilog Z80 - Texas Instruments TI Calculators - Assembly code
Category:Source-based Linux distributions - Linux From Scratch, CRUX, Gentoo
OSSEC - World's Most Widely Used Host Intrusion Detection System - HIDS
OSSEC - free, open-source host-based intrusion detection system (HIDS). It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, time-based alerting, and active response. It provides intrusion detection for most operating systems, including Linux, OpenBSD, FreeBSD, OS X, Solaris and Windows. OSSEC has a centralized, cross-platform architecture allowing multiple systems to be easily monitored and managed. OSSEC has a log analysis engine that is able to correlate and analyze logs from multiple devices and formats. OSSEC is compliant with Payment Card Industry Data Security Standard (PCI DSS) requirements.
Suricata | Open Source IDS / IPS / NSM engine - Suricata is a free and open source, mature, fast and robust network threat detection engine. The Suricata engine is capable of real time intrusion detection (IDS), inline intrusion prevention (IPS), network security monitoring (NSM) and offline pcap processing.
Suricata (software) - Suricata is an open source-based intrusion detection system (IDS) and intrusion prevention system (IPS) - Multi-threading Automatic protocol detection Gzip decompression Independent HTP library Standard input methods Unified2 output Flow variables Fast IP matching HTTP log module JSON standard outputs Windows binaries Lua scripting Prelude output file matching, logging, extraction, md5 checksum calculation IP reputation DNS logger
Upstream (software development) - Wikipedia
What is ASCII-Armor? Pretty Good Privacy PGP
Public Key ASCII Format - armor, pgp, gpg, base64
encryption - What characters are valid in PGP encrypted and signed messages? Radix 64 aka ASCII armored = base64 with checksum - OpenPGP
DEFINITIVE - The beginner's guide to Pretty Good Privacy- PGP -
The GNU Privacy Handbook - GPG -
GnuPG - GPG - official documentation
GNOME/Keyring - a collection of components in GNOME that store secrets, passwords, keys, certificates and make them available to applications
what is -O- option means for wget? - Stack Overflow
chroot - ArchWiki
Find: Ram Size in Linux - /proc/meminfo, free, vmstat, top, dmidecode commands
Linux: Check Ram Speed and Type - dmidecode, lshw
DEFINITIVE - ubuntu - Gsettigs and dconf to set hotkey - keyboard shortcut, keybinding
keyboard shortcuts - Custom global keybindings in cinnamon via gsettings - hotkey, keyboard shortcut
command line - How to set custom keyboard shortcuts from terminal? hotkey, keybinding
Keybindings - hotkey, keyboard shortcut - dconf
Getting Ready for HTTP/3 - vs HTTP/1.1 vs HTTP/2
Obfuscation.dvi - Impeding Malware Analysis Using Conditional Code Obfuscation.pdf
shell script - what is $$ in bash? - $$, $BASHPID
Red + Blue = Purple team - 2 eBooks Bundle - Pentestmag
DEFINITIVE - ramfs, rootfs, initramfs, initramdisk/initrd
Bud17-313 BoF - Device Tree and Secure Firmware - blobs, linux kernel
Embedded Software Security through Key-Based Control Flow - authors Rajat Subhra Chakraborty, Seetharam Narasimhan, Swarup Bhunia
HARDWARE SECURITY THROUGH DESIGN OBFUSCATION by RAJAT SUBHRA CHAKRABORTY
HTTPS Everywhere | Electronic Frontier Foundation
security - Is "HTTPS Everywhere" still relevant? - Super User
The CPU and The Memory - Paging, DRAM, SSD / HDD, L1/L2 cache, register - definitive memory hierarchy visual explanation
DEFINITIVE breakdown - The CPU, Instruction Fetch/Decode/Execute cycle - MAR,MBR,AC accumulator,PC,IR, SP stack pointer - CU Control Unit, ALU Arithmetic Logic Unit, SR Status Register - theoretical registers - Buses - Main Memory - Decoding the opcode
text processing - Common lines between two files - Unix & Linux Stack Exchange
Agile Development Methodology for Embedded Systems: A Platform-Based - Design Approach
The whys and hows of secure boot - definitive overview - IoT security
Qualcomm - Secure Boot and Image Authentication - Technical Overview
Gitolite - allows you to host Git repositories for multiple users easily and securely - git security
Fuse (electrical) - aka ADS (Automatic Disconnection of Supply)
RFC 7530 - Network File System (NFS) Version 4 Protocol
Network File System (NFS) - transparency - stateful/stateless protocol - File Handles, volume identifier, inode number - File Attributes, NFSv2 Protocol - LOOKUP Protocl - Client side caching
Chapter 9. Network File System (NFS) Red Hat Enterprise Linux 6 | Red Hat Customer Portal - how it works - services, daemons
What is Network File System (NFS)? - advantages / disadvantages - uses RPCs Remote Procedure Calls - The NFS protocol is one of several distributed file system standards for network-attached storage (NAS) - Use of UDP, TCP over IP - stateless - security - RPCs vulnerabilities, trusted network behind a firewall
Network File System (NFS) - methodology - portmap
What is distributed file system (DFS)? - Definition from WhatIs.com
Clustered file system - Parallel file systems, file system which is shared by being simultaneously mounted on multiple server
RFC 7862 - Network File System (NFS) Version 4 Minor Version 2 Protocol
NFS File Server - NFS, RPC
Serial port - UART - Common applications, firmware update
Flashrom - Wikipedia
5 Linux / Unix Commands For Connecting To The Serial Console - nixCraft
command line - How to connect to a serial port as simple as using SSH? minicom, screen, picocom, setserial programs
VT100 - Digital Equipment Corporation (DEC) terminal
How to find all serial devices (ttyS, ttyUSB, ..) on Linux without opening them? - Stack Overflow
Select a serial port
linux - How do I know which /dev/ttyS* is my serial port? - Super User
SQLi filter evasion and obfuscation
SQL Injection Optimization and Obfuscation Techniques
Obfuscated SQL Injection attacks
Why do I need sudo? - Ask Ubuntu
Reverse engineering UART to gain shell - iot, embedded, hack, security
Reverse Engineering Serial Ports – embedded, iot, hack, security
UUCP - Unix-to-Unix Copy - UUCPNET
.uucp - Unix-to-Unix Copy Protocol
how to use NFS for the root filesystem - how to use NFS for the root filesystem.
Review: Using Serial Port Monitor to connect to embedded devices - Serial Port Monitor to connect to embedded UART serial ports - putty, termite
How To Check and Use Serial Ports Under Linux -
linux - How to open, read, and write from serial port in C? - Stack Overflow
Serial Programming HOWTO - definitive official documentation - in C
Working with the serial console - dterm, minicom, picocom, screen, serialclient gui
Screen command notes - Noah.org
linux - How to have the cp command create any necessary folders for copying a file to a destination - rsync
Internet of Things Security (W35) - Pentestmag
How to Configure A NFS File Server On Ubuntu 18.04 Bionic Beaver - LinuxConfig.org
How To Set Up an NFS Mount on Ubuntu 18.04 | DigitalOcean
DEFINITIVE - Pay-TV smartcard hacking – how easy is it? Conditional Access Module (CAM) - Conditional Access Systems - paid tvs - decoders/set top boxes hacking - 3DES Encryption
I3C (bus) - MIPI I3C, also known as SenseWire) is an emerging industry standard for multidrop serial data buses - evolution of I2C - Google and Intel have backed I3C as a sensor interface standard for Internet of things (IoT) devices - similar to Serial Peripheral Interface (SPI)
Ethernet Frame Format - GeeksforGeeks
networking - How is encoded data sent over a network? base 64, MIME, HTTP Compression, SMTP - 7-bit/8-bit bytes
Better Security Through Package Fingerprints - GitHub Package Registry - GPR - package management
Package Author Identity through Social Proofs - package management
Package Manager Security - NPM package management - cryptocurrency wallet hacking
c - What is the role of libc(glibc) in our linux app? function vs system kernel calls - linker/linking resolution - bypass libc to make system calls - POSIX API - libc vs glibc, libm
SWIG - Simplified Wrapper and Interface Generator (SWIG) is an open-source software tool used to connect computer programs or libraries written in C or C++ with scripting languages such as Lua, Perl, PHP, Python, R, Ruby, Tcl, and other languages like C#, Java, JavaScript, Go, Modula-3, OCaml, Octave, Scilab and Scheme. Output can also be in the form of XML or Lisp S-expressions.
Parent pointer tree - in-tree or parent pointer tree is an N-ary tree data structure in which each node has a pointer to its parent node, but no pointers to child nodes. When used to implement a set of stacks, the structure is called a spaghetti stack, cactus stack or saguaro stack (after the saguaro, a kind of cactus).Parent pointer trees are also used as disjoint-set data structures. The structure can be regarded as a set of singly linked lists that share part of their structure, in particular, their tails. From any node, one can traverse to ancestors of the node, but not to any other node - compilers design
Tail call - subroutine call performed as the final action of a procedure. If a tail call might lead to the same subroutine being called again later in the call chain, the subroutine is said to be tail-recursive, which is a special case of recursion. Tail recursion (or tail-end recursion) is particularly useful, and often easy to handle in implementations - stack frame, call stack
Introduction of System Call - GeeksforGeeks
UNIX System Calls - definitive academic in depth course
JSON Web Token = JWT - The tokens are designed to be compact, URL-safe, and usable especially in a web-browser single-sign-on (SSO) context. JWT claims can be typically used to pass identity of authenticated users between an identity provider and a service provider, or any other type of claims as required by business processes. JWT relies on other JSON-based standards: JSON Web Signature and JSON Web Encryption
Access token - object encapsulating the security identity of a process or thread- privilege separation - impersonation token - logon service - user id, group id - operating system security - init process
Single sign-on - LDAP - OpenID Connect, Facebook Connect - security, privacy
Session ID - session identifier, session token
Identity provider - IdP, IDP - SAML, OpenID Connect, OAuth
Identity management system - IdM - active directories, service providers, identity providers, Web services, access control, digital identities, password managers, single sign-on, security tokens, security token services (STS), workflows, OpenID, WS-Security, WS-Trust, SAML 2.0, OAuth, and RBAC
On the term "provable security" (by Oded Goldreich)
On Post-Modern Cryptography (essay) - provable security, assumptions
Memory Technology Device - provides an abstraction layer for raw flash devices - vs removable devices - block device - Flash Translation layer
MTD Utilities - Memory Technology Devices provides an abstraction layer for raw flash devices
MTD overview - stm32mpu - Memory Technology Devices) provides an abstraction layer for raw flash devices - visual explanation, schematics - kerel configuration
Flash translation layer - block drivers - file system interface - TrueFFS, ExtremeFFS
File system API/interface - Kernel-level/Driver-based as IFSs, mixed, user space API - using BIOS
Flash memory controller - Wear leveling, Flash Translation Layer (FTL) and Mapping
Memory Technology Device (MTD) Subsystem for Linux - MTD subsystem (stands for Memory Technology Devices) provides an abstraction layer for raw flash devices. It makes it possible to use the same API when working with different flash types and technologies, e.g. NAND, OneNAND, NOR, AG-AND, ECC'd NOR, etc. MTD subsystem does not deal with block devices like MMC, eMMC, SD, CompactFlash, etc. These devices are not raw flashes but they have a Flash Translation layer inside, which makes them look like block devices. These devices are the subject of the Linux block subsystem, not MTD. Please, refer to this FAQ section for a short list of the main differences between block and MTD devices. And the raw flash vs. FTL devices UBIFS section discusses this in more details
Memory Technology Device (MTD) Subsystem for Linux. - FAQ - definitive comparison Block Device vs MTD device - mtd-utils tree - FTL flash translation layer - SSD, MMC, eMMC, RS-MMC, SD, mini-SD, micro-SD, USB flash drive, CompactFlash, MemoryStick, MemoryStick Micro, and other FTL devices are block devices, not raw flash devices. Of course, hard drives HDD are also block devices - NAND, NOR
Collision attack - Chosen-prefix collision attack - cryptanalysis
Preimage attack - cryptanalysis - two types of preimage resistance: preimage resistance, second-preimage resistance - vs collision attack resistance - quantum computers
Birthday attack - cryptographic attack that exploits the mathematics behind the birthday problem in probability theory - cryptanalysis
Meet-in-the-middle attack - MITM - cryptanalysis optimisation process - vs communication interception Man-in-the-middle attack MitM
Brute-force attack - cryptanalysis
Length extension attack - In cryptography and computer security, a length extension attack is a type of attack where an attacker can use Hash(message1) and the length of message1 to calculate Hash(message1 ‖ message2) for an attacker-controlled message2, without needing to know the content of message1 - Algorithms like MD5, SHA-1, and SHA-2 that are based on the Merkle–Damgård construction are susceptible to this kind of attack - The SHA-3 algorithm is not susceptible
NIST hash function competition - SHA 3
User Account Control - UAC - MAC Mandatory Access Control - Authenticated encryption (AE) and authenticated encryption with associated data (AEAD) are forms of encryption which simultaneously assure the confidentiality and authenticity of data. These attributes are provided under a single, easy to use programming interface - pirvilege escalation mitigation - Operating systems on mainframes and on servers have differentiated between superusers and userland for decades
Same password for FDE full disk encryption, user account, admin account - UAC windows, sudo/admin password enabling relevance
xkcd: Authorization - sudo/admin password enabling relevance
TiVo - digital video recorder (DVR)
Digital/Personal video recorder - DVR/PVR - set top boxes - examples on Linux Kodi XBMC, MythTV, Video Disk Recorder (VDR), LinuxMCE, TiVo, VBox Home TV Gateway
Incremental encoder - Wikipedia
UBIFS is a new flash file system developed by Nokia engineers with help of the University of Szeged. In a way, UBIFS may be considered as the next generation of the JFFS2 file-system. - Memory Technology Device (MTD) Subsystem for Linux - raw flash vs block device
JFFS2, UBIFS, and the growth of flash storage [LWN.net] - Journaling Flash Filesystem - UBI, Flash Translation Layer - Logical/Physical Erase Block PEB/LEB, Wear leveling - MTD - radix trees
Difference Between Embedded Linux and Desktop Linux - definitive comparative table
Linux on embedded systems - set-top boxes, smart TVs, personal video recorders (PVRs), in-vehicle infotainment (IVI), networking equipment (such as routers, switches, wireless access points (WAPs) or wireless routers), machine control, industrial automation, navigation equipment, spacecraft flight software, and medical instruments
Difference between running a Bare Metal vs. Embedded Linux applications - Mis Circuitos
Is Ubuntu an embedded Linux system? - Ask Ubuntu
raspbian - What is the difference between running Linux a Raspberry Pi VS a regular system? - bootloader process
What is the difference between RTOS and Embedded Linux? - Stack Overflow
Control store - part of a CPU's control unit that stores the CPU's microprogram. It is usually accessed by a microsequencer
Universal Serial Bus - USB - Wikipedia
Computer security conference - definitive list - vs Hacker conferences - DefCon, MalCon, BlackHat
Wardriving - aka Warbiking, warcycling, warwalking - searching for Wi-Fi wireless networks by a person usually in a moving vehicle - iStumbler InSSIDer Kismet KisMAC NetSpot NetStumbler WiFi-Where WiGLE for Android
Warchalking - symbols in public places to advertise an open Wi-Fi network
Warshipping - physical package delivery service to deliver an attack vector to a target
Maker culture - DIY - hacker culture
Hacker culture - MIT
Hotspot (Wi-Fi) - physical location where people may obtain Internet access, typically using Wi-Fi technology, via a wireless local area network (WLAN) using a router connected to an internet service provider ISP - Wireless Access Point WAP - security issues
Malcon - hacker conference on malware research and development
Why the Security of USB Is Fundamentally Broken | WIRED
SRLabs-BadUSB-BlackHat-v1.pdf
Primitive data type - Wikipedia
Network Time Protocol Best Current Practices - BCP security - embedded devices, IoT - time sources - attacks, daemon restart, information leakage, kiss of death DDoS packets
What is Ping of Death (PoD) | DDoS Attack Glossary | ICMP
Clock drift - timing attack
Distributed computing - vs parallel/concurrent/multithreaded - Three significant characteristics of distributed systems are: concurrency of components, lack of a global clock, and independent failure of components - Examples of distributed systems vary from SOA-based systems to massively multiplayer online games to peer-to-peer applications - RPC, message queues
Defense Advanced Research Projects Agency = DARPA - GPS - cyber warfare
undeciphered writing - Could the Ancient Egyptian hieroglyphs have been deciphered without the Rosetta Stone with modern tech? cryptolinguistics
Cyber Security and Resilience of smart cars Good practices and recommendations - BCP - IoT
(PDF) Security Vulnerabilities and Cyber Threat Analysis of the XMPP Protocol in an IoT Ecosystem
Find command: Exclude or Ignore Files (e.g. Ignore All Hidden .dot Files ) - nixCraft
Initng - next generation init system
algorithm design - What does “invertibility of the cryptographic primitive” mean? - Cryptography Stack Exchange
Is the one-time-pad a secure system according to modern definitions? - OTP
Cryptographic nonce - Wikipedia
Cryptanalytic Attacks on Pseudorandom Number Generators - PRNG security - bruce schneier
Cryptographic sponge functions
Chinese room - cognitive science argument
Turing test - chinese room
Dining cryptographers problem - Wikipedia
Introduction to Modern Cryptography - katz
Non-repudiation - cryptography
Digital signature - Wikipedia
Subliminal channel - covert channels that can be used to communicate secretly in normal looking communication over an insecure channel. Subliminal channels in digital signature crypto systems were found in 1984 by Gustavus Simmons.
Covert channel - In computer security, a covert channel is a type of attack that creates a capability to transfer information objects between processes that are not supposed to be allowed to communicate by the computer security policy
Data integrity - cryptography
linux - What is a sysroot exactly and how do I create one ? - Stack Overflow
How can I copy text to the system clipboard from Vim? - Vi and Vim Stack Exchange
Encryption software - cryptography - IPSec, SCP Secure Copy, Secure email, SSH, SFTP, HTTPS
Clock signal - Wikipedia
Sponge function/construction - They can be used to model or implement many cryptographic primitives, including cryptographic hashes, message authentication codes, mask generation functions, stream ciphers, pseudo-random number generators PRNG, and authenticated encryption AE
Pseudorandomness - computational complexity, cryptography/security
Grover's algorithm - quantum algorithm that finds with high probability the unique input to a black box function that produces a particular output value - NP Completeness - breaking symmetric cryptographic hashing
BHT algorithm - quantum algorithm that solves the collision problem - uses Grover's algorithm
Collision problem - complexity theory, quantum computing, and computational mathematics - BHT algorithm, which uses Grover's algorithm, solves this problem optimally - pigeonhole principle, birthday paradox
Avalanche effect - cryptography, the avalanche effect is the desirable property of cryptographic algorithms, typically block ciphers[1] and cryptographic hash functions, wherein if an input is changed slightly (for example, flipping a single bit), the output changes significantly (e.g., half the output bits flip). In the case of high-quality block ciphers, such a small change in either the key or the plaintext should cause a drastic change in the ciphertext. The actual term was first used by Horst Feistel, although the concept dates back to at least Shannon's diffusion.
Hashcash - proof-of-work system used to limit email spam and denial-of-service attacks, and more recently has become known for its use in bitcoin (and other cryptocurrencies) as part of the mining algorithm - PoW
Comparison of cryptography libraries - Cryptography libraries - Key operations - Key generation and exchange - Elliptic curve cryptography (ECC) support - Public key cryptography standards - Hash functions - MAC algorithms - Block ciphers - Block cipher algorithms - Cipher modes - Stream ciphers - Hardware-assisted support - Smartcard, SIM and HSM protocol support - General purpose CPU / platform acceleration support - Microcontrollers' cryptographic accelerator support - Code size and code to comment ratio - Portability
SHA-256 Algorithm – Encryption – BitcoinWiki - sha 3
Number theory - arithmetic - integer, prime factorization
The Birth of Cryptographic Obfuscation – A Survey - 2018 - definitive academic paper - homomorphic, functional encryption
Yehuda Lindell - israeli cryptographers - academic cryptography resources, papers, books
Rabin cryptosystem - asymmetric cryptographic technique, whose security, like that of RSA, is related to the difficulty of integer factorization. However the Rabin cryptosystem has the advantage that it has been mathematically proven to be computationally secure against a chosen-plaintext attack as long as the attacker cannot efficiently factor integers, while there is no such proof known for RSA.
Oded Goldreich - cryptography academic resources
systemd-boot - gummiboot
Hypertext caching protocol - (abbreviated to HTCP) is used for discovering HTTP caches and cached data
H-TCP - another implementation of TCP with an optimized congestion control algorithm for high speed networks with high latency
Where do I find the version of a Linux kernel source tree? make kernelversion
General Computer Science Articles - resources - Hackman's Realm - Hackman's Realm Major news which isn't so new anymore: The first preview demo of the BOTS prologue has been released. Game artists are still very much needed for this project! I'm also running a game music recognition contest. The prize up for grabs is US$100. With that taken care of, here's the rest of the site... Welcome one and all to Hackman's Realm, a website which is basically about nothing. I've put up a Site FAQ. This FAQ contains questions that actually do get asked frequently. No, really, honest. For more than five years, this part of the site declared that it was "heavily under construction". That was true back then; However, those days are gone. At this point, I feel like I have done about as much with this website as I ever wanted to do, and although I will still add occasional updates to it here and there, it will likely remain as it is indefinitely. Certainly, if you (or anyone else) feels that something should be added or changed, I will try to accomodate their suggestions. However, I feel that I have done and written about most of the interesting things to do with computers that I was ever interested in. Thus, I don't have a whole lot left to write about. Enjoy the site, folks, and I'm still open to your feedback, so if you have anything to say, let me know. Having said that, here's what passes for content on this website: Basic C For everyone just beginning C, hey, here's a cute little introduction to the language. Java Java is becoming a very important programming language. Come here to find out why (and for a cute picture of some beans). JavaScript A language which people confuse with Java, even though it's not the same. It's scripty. BASIC If you have never done any programming before, skip the C and Java and try BASIC. If you've always wanted to program computers but never gotten around to it, right now is the perfect time to learn, and BASIC is a great language to start with. Pascal An intermediate-level programming language which is good for hobbyists, but not serious programmers. If you're programming for fun, though, check it out. Assembler (Assembly language) The lowest-level programming language there is on a PC. If you really want to know how to directly control your computer, and if you have already programmed before (assembler is definitely NOT for beginning programmers), check it out. It's a rewarding experience, for those who have the patience. LISP "The mother tongue of AI", or a has-been? You decide, but you can't decide until you learn it. Perl The new-generation programming language, for those who want to write CGI, or just have a good time studying what could be the next big thing. Or not. Python A relatively new name which may be the best choice for your first language. Introduction To Object-Oriented Programming CGI Common Gateway Interface, the industry's first solution to the problem of web sites being able to send information to the user, but not vice-versa. HTML Everything you need to know about the industry-standard page-description language of the Web. XML A data-oriented approach to HTML. SQL The industry-standard database query language, SQL is not really a "programming" language, although it may be of interest to programmers. Verilog The more easy-to-use of the two hardware description languages in common use. Programming the Win32 registry Games Everybody's favorite part of computers! After all, who REALLY cares about being "productive"? Games that embody the spirit of creativity, exploration, and experimentation with computers Cyberpunk Games A small list of computer games of the cyberpunk genre. Solution Guide to Castle Adventure Timeless Game Design A response to Bateman and Boon's book 21st Century Game Design. A list of the games depicted in the PIX folder on the Game Empire II CD Frank's Adventure songs Text file listing the songs used in the Frank's Adventure series of Flash-based Hentai adventure games (since I couldn't find a similar list anywhere else)
DNS - The Internet's system for resolving names to IP addresses. C code for creating DNS queries and responses.
A case study in making a raw IP socket - C programming
CPU design - registers,reset vector, ring counter, control matrix, instruction decoder, timing circuitry, arithmetic logical unit alu,
An Introduction To Programming With ATA And ATAPI - Advanced Technology Attachment - IDE (Integrated Drive Electronics)
Linux Filesystems: Where did they come from? [linux.conf.au 2014] - YouTube
Why won't 64-bit Linux let me execute a 32-bit executable ? shared libraries, ldd command
Intelligent Platform Management Interface - IPMI
cpu - What is difference between U-Boot and BIOS ? - Super User
bootloader - Difference between U-Boot and UEFI firmware - Super User
How to Find Identifying Information from a Phone Number Using OSINT Tools - phoneinfoga
How to Use Kismet to Watch Wi-Fi User Activity Through Walls - wardriving
How to move from microcontrollers to embedded linux? drivers
encryption - Is there a bulletproof way to know a file has been successfully decrypted? - Cryptography Stack Exchange - cryptanalysis
The root filesystem
Why is the use of device tree blobs considered advantageous for embedded Linux applications? dts, dtb
How does Uboot pass device tree information to Linux kernel? TheKernel() method
DEFINITIVE - Device trees everywhere - introduction - flattened device tree - dtc compiler
Using Linux Device Trees for Fun and Profit | uImage U-Boot bootloader - dtb
About The Device Tree - decompilation - compiler/decompiler - dtb, dts
Device Tree Overlays | adding hardware components to dtb
How To Test your Firewall Configuration with Nmap and Tcpdump - definitive
OSI model - Open Systems Interconnection model - standardized by ISO - definitive - protocol data unit PDU per layer - data, segment vs datagram, packet, frame, symbol
NIST - Guidelines on Firewalls and Firewall Policy - Special Publication 800-41 Revision 1 - 2009
linux - How to ping when behind a proxy? - LAN
ICMP (Internet Control Message Protocol) | NetworkLessons.com
Bypassing Firewall Rules | Nmap Network Scanning - ftp bounce, mac address spoofing, proxies, fragmentation, ipv6 attack, IPSec, source port manipulation
networking - NMAP Always says host is down (when using -Pn it says ports filtered) - ICMP packets filtering -
Are RAM and ROM part of the primary memory? BIOS
The Tragedy of systemd - YouTube
Make your Firefox browser a privacy superpower with these extensions : firefox
Can a chip be developed with RAM, ROM and CPU combined in one unit? definitive mcu microcotnroller vs SoC
Will CPU chips contain the entire RAM in the future? - DRAM, SRAM, cache, die
Why is RAM not put on the CPU chip? on-chip SRAM
linux - How do I add functionality to an existing binary executable? - Reverse Engineering Stack Exchange - LD_PRELOAD - userland rootkit
The Linking Process Exposed — Static vs Dynamic Libraries
Controller (computing) - chip (such as a microcontroller), an expansion card, or a stand-alone device that interfaces with a more peripheral device. This may be a link between two parts of a computer (for example a memory controller that manages access to memory for the computer) or a controller on an external device that manages the operation of (and connection with) that device
Exokernel - Exokernels are tiny, since functionality is limited to ensuring protection and multiplexing of resources, which is considerably simpler than conventional microkernels' implementation of message passing and monolithic kernels' implementation of high-level abstractions.
Microkernel - (often abbreviated as μ-kernel) is the near-minimum amount of software that can provide the mechanisms needed to implement an operating system (OS). These mechanisms include low-level address space management, thread management, and inter-process communication (IPC). If the hardware provides multiple rings or CPU modes, the microkernel may be the only software executing at the most privileged level, which is generally referred to as supervisor or kernel mode. Traditional operating system functions, such as device drivers, protocol stacks and file systems, are typically removed from the microkernel itself and are instead run in user space. In terms of the source code size, microkernels are often smaller than monolithic kernels.
CPU selection in embedded systems - Embedded.com - motorola, arm, x86, powerpc
RFC 5909 - Securing Neighbor Discovery Proxy: Problem Statement
software recommendation - Simple image editor? Microsoft Paint alternative on Linux
Carriage return - cartridge return and often shortened to CR, <CR> or return, is a control character or mechanism used to reset a device's position to the beginning of a line of text. It is closely associated with the line feed and newline concepts, although it can be considered separately in its own right - ASCII, unicode , ebcdic
Forward declaration - Wikipedia
defense - Convince people not to share their password with trusted others - Information Security Stack Exchange - sensitization, awareness
exploit - How to explain to traditional people why they should upgrade their old Windows XP device? - Information Security Stack Exchange - sensitization, awareness
Definition of authenticity - vs integrity vs entity authentication
OpenSSLWiki - official reference - definitive doc
Linux Filesystem Events with inotify | Linux Journal
linux - Kernel inotify watch limit reached - /proc/sys/fs/inotify/max_user_watches
inotify - (inode notify) is a Linux kernel subsystem that acts to extend filesystems to notice changes to the filesystem, and report those changes to applications. It replaces an earlier facility, dnotify, which had similar goals
linux - What is the proper way to use inotify? - C API
Monitor Linux file system events with inotify – C API
Inotify: Efficient, Real-Time Linux File System Event Monitoring
ArmEabiPort - EABI is the new "Embedded" ABI. EABI is actually a family of ABIs and one of the "subABIs" is GNU EABI, for Linux.
nm (Unix) - unix command - name mangling
What Meltdown and Spectre Flaws Mean for Cryptocurrency -
Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory - IEEE Conference Publication - cold boot attacks
DEFINITIVE - Secure Boot on embedded Sitara™ processors (Rev. A) - IoT, emebedded - key management
PixelVault: Using GPUs for Securing Cryptographic Operations - memory attak, cpu code injection
The Definitive Guide to Encryption Key Management Fundamentals - physical security - hsm hardware security module - pki, kmip, pci dss, hipaa, sox, csaeu gdpr - secure key storage/retrieval
NIST Special Publication 800-57, Recommendation for Key Management Part 1: General (Revision 3) - secure key storage/retrieval
Is Full Disk Encryption The Strongest Defense Against Attack? | IDSC Blog - International Data Sanitization Consortium - self encrypting drives - issues, weaknesses
Clipper chip - NSA manufactured chip with builtin backdoor - state surveilance, privacy
Is it possible to do Public Private Key Encryption on a chip (hardware)? - smartcards - private keys
Private Key Extraction from Qualcomm Hardware-backed Keystore - CVE-2018-11976 - QSSE
Listen up: RSA keys snatched by recording CPU sounds with a phone | side channel attack
Quantum computing and Bitcoin - Bitcoin Wiki
ZombieLoad Attack - After Meltdown, Spectre, and Foreshadow, we discovered more critical vulnerabilities in modern processors. The ZombieLoad attack allows stealing sensitive data and keys while the computer accesses them - RIDL, Fallout, MDS
CYW4390X: OTP Programming and Using Secure Boot and Secure Flash - download
How Hackers Bypassed an Adobe Flash Protection Mechanism - exploit - CVE-2018-4878
Self-encrypting drives are hardly any better than software-based encryption - If a laptop using a self-encrypted drive is stolen or lost while in sleep mode, the security of its data can't be guaranteed - Hardware based vs software based Full Disk Encryption FDE - evil maid attacks - Trusted Computing Group (TCG) Storage Security Subsystem Class standard, also known as Opal, and Microsoft’s Encrypted Drive (eDrive) standard, which is based on Opal - hot plug/unplug attacks, BSOD Windows attack
FIPS 140-2 - SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES - physical security, RNGs, secure key management/storage/generation
Doh! What My Encrypted Drive Can Be Unlocked By Anyone? SED Self Encrypting Drive - vulnerabilities - self encrypting deception
What users should know about Full Disk Encryption based on LUKS - FDE - Linux Unified Key Setup (LUKS), Password-Based KeyDerivation Function 2 (PBKDF2), Full Disk Encryption (FDE), hashfunctions, HMAC - password management
Full Disk Encryption | Identity and Access Management Concepts - Key generation/management - secure key storage/retrieval - key derivation from password - user key vs encryption key
What is fcntl.h in Linux? system call
c - Variable declaration between function name and first curly brace - Stack Overflow
assembly - Hooking x86 reset vector - BIOS
unix - How can I grep for a string that begins with a dash/hyphen? - Stack Overflow
Guide to pkg-config - .pc files
pkg-config - .pc file - pkg-config --libs --cflags
How does Peano Postulates construct Natural numbers only? natural numbers, peano axioms
public key - Suppose I capture encrypted data that I want to decrypt. Could I use a server farm to decrypt? - cryptanalysis, brute force cracking, publik key cryptography, computing power
access control - If password expiration is applied, should door-lock expiration be applied too? physical key, lock picking,
rm: cannot remove file: Read-only file system - usb drive
penetration test - Tiger team versus red team? vs blue, white
Red team - Wikipedia
linux - I can't delete files 'rm: cannot remove X Read-only file system' - usb drive
How to Remove a Stripped Screw - vis foiré
GitHub - git-tips/tips: Most commonly used git tips and tricks - definitive
Learning How to Git: Ignoring Files and Folders using GitIgnore
Git - gitignore Documentation
ASCIIFlow Infinity - ASCII diagrams and charts builder
How does the vim "write with sudo" trick work?
How to develop a Firefox extension | Mozilla Add-ons Blog
When do honest people need privacy or anonymity? (e.g. they have nothing to hide) - argument
tls - privacy - Which parts of URL is protected by HTTPS? privacy
confidentiality - Does SSL/TLS (https) hide the urls being accessed - privacy
cryptography - Are URLs viewed during HTTPS transactions to one or more websites from a single IP distinguishable? - privacy
ssl - Are HTTPS URLs encrypted? - privacy
Branching a Repository - git
GNU Autotools - tutorial
Introduction to the Autotools (autoconf, automake, and libtool) - pkgconfig, .pc files - references, resources
version control - How do I undo the most recent local commits in Git? - Stack Overflow
How to cancel the currently-applied remaining sudo time-out? sudo -k - cancel current timeout
How can I see which Git branches are tracking which remote / upstream branch? - git branch -vv - git remote show origin
Introduction to the GNU Build System (Autotools) - automake, autoconf
git rm - How to revert a "git rm -r ."? git reset --hard HEAD - git stash - pop
How to generate .pc files with Autotools - pkgconfig - .pc.in files
Style - C FAQ - coding standard -
How can I search within a manpage? - Ask Ubuntu
GNU Emacs FAQ
EmacsWiki: Indentation Basics
Change tab width in emacs - Stack Overflow
The Ultimate Guide To Indentation in Emacs (Tabs and Spaces)
indentation - Trouble adjusting tab-width - Emacs Stack Exchange
EmacsWiki: Indenting C - tabs
git - How to recover stashed uncommitted changes - apply stash - pop, push
Git merge two local branches - Stack Overflow
unix - What do double-asterisk wildcards mean? shopt -s globstar - ** - wildcard expansion
networking - Should I run my small website in port 80, 8080, or 81? - Super User
Are port 80 and 8080 the same? - Quora
netcat-writeup/netcat.md at master · Tanq16/netcat-writeup · GitHub - cheat sheet
GitHub - Tanq16/setuid-lab-writeup - Set-UID attack lab - seed lab solution
Set-UID - seed labs - solved in https://github.com/Tanq16/setuid-lab-writeup
GitHub - Tanq16/xss-lab-writeup - seed lab solution -
GitHub - Tanq16/md5col-lab-writeup - seed lab solution
networking - Ping to Windows 10 not working if "file and printer sharing" is turned off? - icmp inbound rules - firewall
c - Read/write from file descriptor at offset - pread, pwrite - thread safe, offset
Input-output system calls in C | Create, Open, Close, Read, Write - file descriptor table, entry - process - stdin,stdout, stderr
Handle (computing) - vs pointer - security - examples file descriptors, network sockets, database connections, process identifiers (PIDs), and job IDs - file descritor table usage example, /etc/shadow example - capabilities - memory management, FILE structure in libc - Windows HWND type
Opaque data type - abstract data type - libc FILE structure - opaque pointers
Information hiding - object oriented programming OOP - encapsulation - code/system design, architecture
Compartmentalization (information security) - Wikipedia
Shatter attack - programming technique employed by hackers on Microsoft Windows operating systems to bypass security restrictions between processes in a session. A shatter attack takes advantage of a design flaw in Windows's message-passing system whereby arbitrary code could be injected into any other running application or service in the same session, that makes use of a message loop. This could result in a privilege escalation exploit
Computer virus - malware - Infection mechanism, Trigger, Payload - Dormant phase, Propagation phase, Triggering phase, Execution phase, Infection targets and replication techniques, Resident vs. non-resident viruses, Macro viruses, Boot sector viruses, Email virus, Stealth techniques, Read request intercepts, Self-modification, Encrypted viruses, Polymorphic code, Metamorphic code
Memory pool - fixed-size blocks allocation, is the use of pools for memory management that allows dynamic memory allocation comparable to malloc or C++'s operator new. As those implementations suffer from fragmentation because of variable block sizes, it is not recommendable to use them in a real time system due to performance. A more efficient solution is preallocating a number of memory blocks with the same size called the memory pool. The application can allocate, access, and free blocks represented by handles at run time. Many real-time operating systems use memory pools, such as the Transaction Processing Facility. Some systems, like the web server Nginx, use the term memory pool to refer to a group of variable-size allocations which can be later deallocated all at once. This is also known as a region; see region-based memory management.
Region-based memory management - zone, arena, area, or memory context - stack allocation
Weak reference - garbage collector
Stack machine - instruction set architecture (ISA) style known as a zero address format - compilers, interpreters
Double fault - On the x86 architecture, a double fault exception occurs if the processor encounters a problem while trying to service a pending interrupt or exception. An example situation when a double fault would occur is when an interrupt is triggered but the segment in which the interrupt handler resides is invalid. If the processor encounters a problem when calling the double fault handler, a triple fault is generated and the processor shuts down. As double faults can only happen due to kernel bugs, they are rarely caused by user space programs in a modern protected mode operating system, unless the program somehow gains kernel access (some viruses and also some low-level DOS programs). Other processors like PowerPC or SPARC generally save state to predefined and reserved machine registers. A double fault will then be a situation where another exception happens while the processor is still using the contents of these registers to process the exception. SPARC processors have four levels of such registers, i.e. they have a 4-window register system.
Triple fault - x86 computer architecture, a triple fault is a special kind of exception generated by the CPU when an exception occurs while the CPU is trying to invoke the double fault exception handler, which itself handles exceptions occurring while trying to invoke a regular exception handler.
c - Why glibc is maintained separately from GCC? GNU Standard C Library
Bypassing non-executable-stack during exploitation using return-to-libc - exploitation, shellcode, system() call
Bypassing ASLR – Part I – Bypassing non-executable-stack during exploitation using return-to-libc
Return to Libc - ret2libc - bi0s wiki - exploitation, shellcode
Binary Exploitation - bi0s wiki - stack/buffer overflow - format string vulnerability - integer overlow
Reverse Engineering - C Language - x86 assembly programming - GDB, radare, Process Explorer
Cyber Forensics - Image Forensics , Steganography, LSB Encoding - Network Forensics, Network protocols and the OSI model, Basic Wireshark Usage ,Memory Forensics , Volatility
Cryptography - What is Encryption Bruteforce Encoding Classification Of Cryptosystems Evolution Hashing, Stream Cipher, Substitution Cipher, Transposition Cipher, XOR Encryption, RSA
Training for CTFs - bi0s wiki
The Definitive Guide to Linux System Calls - interrupts
Memory overcommitment - virtualization, memory swapping, linux kernel -
GPG Key Migration - Packagecloud Blog
Attacks against GPG signed APT repositories - package managers security
The Linux kernel: User space and the libc interface - Kernel and user space
64-bit Linux stack smashing tutorial: Part 1 – Techorganic – Musings from the brainpan
operating system - Difference between ISR Interrupt Service Routine and Function Call? - Stack Overflow
Plan 9 from Bell Labs - distributed operating system, originating in the Computing Science Research Center (CSRC) at Bell Labs in the mid-1980s, and building on UNIX concepts
Distributed operating system - Wikipedia
User space to kernel space transition - system call entry - Kernel perspective - CPU perspective , privileges, rings - MMU
Does a buffer overflow vulnerability always mean a code execution vulnerability? - Information Security Stack Exchange
authentication - Storing info in JWT payload - Information Security Stack Exchange
linux - What is the difference between kernel drivers and kernel modules? insmod, modprobe, initrd, process scheduler - userland - bootloader
An intro to the great language with the strange name - awk
DEFINITIVE - Learn Linux, 101: Create partitions and filesystems – block/character devices - mbr, gpt, mkpart - filesystem types breakdown - swap space
Change Linux Runlevels, boot targets, shutdown, and reboot – system v
posix - What's the difference of the Userland vs the Kernel? - userspace, kernel space
kernel - What are high memory and low memory on Linux? highmem
Linux Kernel memory management quote - highmem - high/low memory
linux - High memory (user space) and highmem (kernel space) - virtual vs physical memory - virtual address space - 32 bits
What's the use of having a kernel part in the virtual memory space of Linux processes? - Unix & Linux Stack Exchange
linux - Do the virtual address spaces of all the processes have the same content in their "Kernel" parts? linux-kernel virtual-memory - page table isolation
KAISER: hiding the kernel from user space [LWN.net]
DDoS - Can user space memory make the system go haywire? - fork bomb
Starvation (computer science) - scheduling algorthms, deadlock, critical sections
Critical section - multithreading, concurrent
linux - How does the OOM killer decide which process to kill first? Out Of Memory - OOM_Score
64 bit - Is highmem relevant in 64 bit Linux? If not, why? Documentation/vm/highmem.txt quote - vs 32 bit
Simple kernel attack using socketpair - exploit source code, malware - discussed here https://unix.stackexchange.com/questions/4387/why-should-a-user-program-mess-with-kernel-space
kernel attack - Why should a user program mess with kernel space? - memory leak, DoS denial of service, kernel resource exhaustion - sockets opening - file descriptors - ionice, process renice - discussing malware exposed in https://lkml.org/lkml/2010/11/25/8
C library system-call wrappers, or the lack thereof - bypass libc to make system calls - syscall() -
System Calls
System Calls - definitive - Virtual Dynamic Shared Object - user space access
Does the Linux kernel have its own virtual address space like every user mode process does? Does the kernel have any virtual memory at all? How do the kernel developers avoid the cost of context switch between address spaces on every system call? - high memory, low memory - kernel/user space
renice command: Change the Priority of a Already Running Process - nixCraft
Introduction to Operating Systems - homeworks with solutions - academic course
BusyBox - Wikipedia
BusyBox
Shortcut to Move Tabs in Firefox - Ask Ubuntu
Keyboard shortcuts - Perform common Firefox tasks quickly | Firefox Help
shortcut key to detach a tab in firefox (move tab to new window) - Super User
Blockchain to Secure IoT Data - IoT security - smart contracts
Making your WordPress Website More Secure - security
Is your Web Application Secure Enough? Think Again - OWASP - web security
Code reuse - software design, architecture
Reusability - software design, architecture
n1624.pdf
DD. Unspecified Behavior - SEI CERT C Coding Standard - definitive list - secure coding
Port Forwarding for SSH & HTTP on VirtualBox - Platform Engineer - Medium
Analyzing the MD5 collision in Flame malware
Reverse-engineering of the cryptanalytic attackused in the Flame super-malware
Fast Collision Attack on MD5
Lab 1: Classical Cryptanalysis and Attacking Cryptographic Hashes - academic course - exercise
Improved Collision Attack on MD5
A study of the MD5 attacks: insights and improvements - definitive -
Flame malware wielded rare “collision” crypto attack against Microsoft | Ars Technica
shell - How to properly nest Bash backticks - command substitution
What is the difference between ADSL and a DSL router, in terms of the routers and the type of connection? - Quora
Asymmetric digital subscriber line - ADSL
Digital subscriber line - DSL
Signed overflow in C++ and undefined behaviour (UB) - integer conversion
Writeups Archives – Megabeets
Network File System (NFS) - /etc/exports
No systemd - definitive criticism resources, arguments - upstart
services - How to list all running daemons? - Unix & Linux Stack Exchange
OpenWrt Project: Procd system init and daemon management
Chaos engineering - Wikipedia
Open banking - fintech
encryption - Does putting the key used to encrypt a symmetric cipher in the ciphetext (encrypted) mean a security decrease? - pseudo random permutation, birthday attack
eb application - Should user input be validated for its length in PHP (server side) as a security measure? sqli, xss - injection attacks
Execute vs Read bit. How do directory permissions in Linux work? cs regular files - sticky bit -
Linux - How to recursively chmod a folder? - Super User
vim plugin - Vim align text to left side - Stack Overflow
gitlab - ssh: Could not resolve hostname git: Name or service not known fatal: Could not read from remote repository - Stack Overflow
How to stash uncommitted changes with Git Stash - Durga Swaroop Perla - pop, apply
git stash `No local changes` but git status `ahead of origin/master by 3 commits` - Stack Overflow
version control - What's the best three-way merge tool? KDiff3 vs DiffMerge vs P4Merge vs Meld vs Beyond Compare Pro vs WinMerge
version control - How do I delete a Git branch locally and remotely? - Stack Overflow
Return-To-Libc Attack SEED Labs Solution - YouTube
SEED Labs - complete lectures/assignments
aasthayadav/CompSecAttackLabs: Contains Attack labs - SEED Labs - partial solutions
GitHub - Avigdor-Kolonimus/SEED-labs: Contains SEED labs, Cyber security Exercises - solutions
PHP | MySQL Database Introduction - GeeksforGeeks
MySQL Introduction
SQL - LINQ
OpenDDS - Data Distribution Service
CRUD - Create, read, update and delete - database principle, persistent storage, dds - SQL, HTTp, RESTful webservices,
Comparison of relational database management systems - Wikipedia
List of relational database management systems - RDBMS
MySQL | definitive Common MySQL Queries - introduction
networking - SSH into NAT-configured VMWare VM from another machine - Super User
VirtualBox lab: Port Forwarding - ssh to guest
Creating a Linux service with systemd - Benjamin Morel - php
SSH/Secure File Transfer Protocol - SFTP
SSH - dependant on TCP
List of network buses - List of electrical characteristics of single collision domain segment "slow speed" network buses - I2C, SPI, CAN, LIN
Outline of computing - computer science
Comparison of file transfer protocols - bittorrent, ftp, https
MD5 Collision Attack Lab — A Cryptographic Security SEEDLab - solution
Kevin Du - SEED Labs video lecture - academic courses
Computer & Internet Security - SEED Labs corresponding lectures, slides and problems/exercises - challenges - definitive
Choosing the Right Container: Associative Containers – definitive comparison - unordered_set, map - C++ STL
Command-line interface - CLI - options/switches
Keep password in macro? - Kerkhoff Principle
vi - How do you display the filename of the file you are working on in vim? - Stack Overflow
filenames - Vim: what are all the possible swapfile extensions? .swp, .swo, .swa
encryption - Theoretically, what if I were to change some magic numbers in, say, AES - subbytes - embedded systems, IoT - S-Box - side channel attacks
Remembering previous deletes/yanks - pastes
Internet Control Message Protocol - ICMPv4
Introducing the Windows PowerShell ISE - PowerShell | Microsoft Docs
10 reasons for using PowerShell ISE instead of the PowerShell console – 4sysops
ICMP tunnel - Wikipedia
How to Allow Pings (ICMP Echo Requests) Through Your Windows Firewall - netsh advfirewall firewall add rule
phpMyAdmin - mysql, mariadb
linux - How to make cut/copy/paste in GVim on Ubuntu work with Ctrl+X,Ctrl+C,Ctrl+V? - Super User
Bash Shell Count Number of Characters In a String or Word - wc
string - Number of characters in a shell command's output - Unix & Linux Stack Exchange
linux shell wc -c count characters +1 - Super User
Autotools Mythbuster
Linking (automake) - LDADD, bin_PROGRAMS
Program and Library Variables (automake) -
Preset Output Variables - Autoconf - autotools
Undo and Redo | Vim Tips Wiki | Fandom
c++ - gdb list error "No such file or directory" - Stack Overflow
Serial cable - baud rate
DEFINITIVE - Serial HOWTO - reference doc - serial ports - UARTs - bytes hardware transfer, transmission/reception - RS-232 spec
Serial Programming - Wikibooks, open books for an open world
Serial HOWTO: Introduction
Native and Remote debugging techniques in Embedded linux
Remote debugging with GDB; part 1: Gentoo – gdbserver
vDSO - virtual dynamic shared object) is a Linux kernel mechanism for exporting a carefully selected set of kernel space routines to user space applications so that applications can call these kernel space routines in-process, without incurring the performance penalty of a mode switch from user to kernel mode that is inherent when calling these same kernel space routines by means of the system call interface - vsyscall - ELF, DWARF - ABI
Re: *_LDFLAGS vs. *_LDADD vs. *_LIBADD - autotools
c++ - What is the difference between LDADD and LIBADD? - autotools
[libvirt] [PATCH] build: use LIBADD, not LDFLAGS, for adding libraries - autotools
build: put libraries in LDADD, not LDFLAGS - autotools
including libraries in Makefile.am - LDADD, LDFLAGS, bin_PROGRAMS
Debugging with GDB - MIPS Embedded
Remote debugging with GDB - docker
Linux – Remote Debugging With GDB – gdbserver
Is there a way for non-root processes to bind to "privileged" ports on Linux? - capabilities -
c - Is a dereferenced pointer a valid lvalue?
Kinibi TEE: Trusted Application exploitation - hacking
Software Guard Extensions - SGX - secure enclaves - Prime+Probe attack - spectre like attack
What is Secure Enclave? Apple, ARM - iOS kernel - microkernel
Secure Enclave - The iPhone Wiki
Attacking the Intel Secure Enclave - Schneier on Security
US8832465B2 - Security enclave processor for a system on a chip - SEP on SoC
Demystifying the Secure Enclave Processor - SEP - Hacking
How to Protect Apps from Buffer Overflow Attacks | Address SANitizer ASAN
Introduction-to-Trusted-Execution-Environment- TEE
GitHub - awnumar/memguard: Secure software enclave for storage of sensitive information in memory - security golang go cryptography memory crypto
Crypto-processor - Architecture, programming and evaluation of the security - PRNG, RAM, Threat Model -
Crypto processors - Crypto processors aren’t new. First used in military applications, they came into commercial applications in the mid-1980s when IBM’s 3480 was outfitted with them, and they have been used in ATM and banking applications to secure transactions. In the last 10 or so years, scaled-down versions have been showing up in consumer devices such as smart cards, SIM cards, cellular radios, set-top boxes, automobiles, game consoles
AMD_Memory_Encryption - Secure Memory Encryption SEM - Secure Encrypted Virtualization SEV
Ultra simple way to encrypt non‐volatile main memory - Hou - 2015 - Security and Communication Networks - NVMM
Protecting Cryptographic Keys and Computations via Virtual Secure Coprocessing
How to detect, prevent, and mitigate buffer overflow attacks | secure coding
Qualcomm® Secure Processing Unit SPU230 Core Security Target Lite - 1045b_pdf.pdf
c - Protecting allocated memory - mprotect
Can you access another program's memory with malloc? VirtualAlloc, sbrk, mmap
access control - Reading physical memory frame previously owned by another process to read contents of its memory page - mmap, fork, clone - secure coding
Hooks for Malloc (The GNU C Library)
typedef specifier in C++
Typedef declaration in C
tls - Will the same Javascript fetched by HTTP and HTTPS be cached separately by the browser? tls web-application web-browser http same-origin-policy
GDB - eLinux.org
cbc - Is encrypting a single 128 bit block with AES ECB "safe" - Cryptography Stack Exchange
bash - How to do a privileges escalation with ping? setuid, set-uid, SUID - raw socket ICMP
encryption - Why does OpenSSL append extra bytes when encrypting with aes-128-ecb? PKCS#7 padding
A checklist for writing pkg-config files | .pc.in files - autotools
vim - vi shortcut to delete "until the next X character" - underscore
The GNU Awk User's Guide - definitive exhaustive doc - regexps
Worst case scenario, what can a Chrome extension do with "Your data on all websites" and "Your tabs and browsing activity"? browser - add ons, privacy
How to force a merge with Git - Quora
Squash my last X commits together using Git - rebase
Git: Squash your latests commits into one · Ariejan de Vroom
Directory Variables (GNU Coding Standards) - prefix - bindir
Bak file - extension
strcat, strcat_s - cppreference.com
Persistence (computer science) - file system journaling
hash - In 2020, SHA-1 practically broken in chosen-prefix collision (CP-collision). Can double SHA-1 hashing prevent CP-collision? - Cryptography Stack Exchange
Code segment - paging, memory pages - heap, stack based overflow - stack smashing
Computer architecture - ISA instruction set architecture
Self-modifying code - Wikipedia
physical access - What are the potential risks of leaving a device in public, but locked? - Information Security Stack Exchange
Using the strerror()/strerror_s() C function to display the error messages for the respective error numbers
String Concatenation - How to play with strings in C
How do I concatenate const/literal strings in C? - Stack Overflow
How do I concatenate two strings in C? - Stack Overflow
Methods to concatenate string in C/C++ with Examples - GeeksforGeeks
C Program to concatenate two strings without using strcat - GeeksforGeeks
Efficient string copying and concatenation in C - Red Hat Developer
network - Can someone steal my IP address and use it as their own? IP stealing - BGP hijacking
How to do whole-word search similar to "grep -w" in Vim - Stack Overflow
select - unix system call - int select(int nfds, fd_set *readfds, fd_set *writefds, fd_set *errorfds, struct timeval *timeout); - fd_set type arguments may be manipulated with four utility macros: FD_SET(), FD_CLR(), FD_ZERO(), and FD_ISSET() - code example - vs poll(), kqueue, epoll, /dev/poll and I/O completion ports
c++ - input_event structure description (from linux/input.h) - Stack Overflow
linux/input.h at master · spotify/linux · GitHub
Input Subsystem — struct input_value
The Linux input driver subsystem - struct input_event
Input Event Drivers--Essential Linux Device Drivers- Kernel's input subsystem - struct input_event
Handle multiple socket connections with fd_set and select on Linux – An fd_set is a set of sockets to "monitor" for some activity. There are four useful macros : FD_CLR, FD_ISSET, FD_SET, FD_ZERO for dealing with an fd_set -
c++ - How to access FDs in fd_set through indexing in Linux? select() vs poll()
c - How to use struct timeval to get the execution time? - Stack Overflow
c - Checking if errno != EINTR: what does it mean? System calls that are interrupted by signals can either abort and return EINTR or automatically restart themselves if and only if SA_RESTART is specified in sigaction(2) - restart_block
process - `EINTR`: is there a rationale behind it? - signals, sa_restart, recv() - The Rise of 'Worse is Better'
linux - Can a system call with non documented `EINTR` return `EINTR`? - errno, sa_restart - stat
DEFINITIVE - EINTR and What It Is Good For - with code examples - recv(), signal handlers, SIGINT - one of the POSIX errors that you can get from different blocking functions (send, recv, poll, sem_wait)
Computer file - size, corruption
Magic number (programming) - Wikipedia
List of file formats - Wikipedia
File format - Wikipedia
public key - Is 128-bit security still considered strong in 2020, within the context of both ECC Asym & Sym ciphers - Cryptography Stack Exchange
Why do email server/clients block executable attachments?
web application - Is it a security vulnerability to tell a user what input characters are valid/invalid? - web-application vulnerability obscurity/obfuscation data-validation error-handling
Data models - LLP64 - ILP32LL
C-list (computer security) - capability-based computer security, a C-list is an array of capabilities, usually associated with a process and maintained by the kernel - file descriptor
Object-capability model - Wikipedia
pointers - What does "void *(*)(void *)" mean in C++? nameless function pointer - cdecl
c - What does ((void (*)())buf)(); mean? - cdecl - cast variable to pointer to function
Gentoo Cheat Sheet - 1 Package management 1.1 Sync methods 1.2 Package listings 1.3 Package installation and removal 1.4 Package upgrades 1.5 Package troubleshooting 1.6 Portage enhancements 1.7 After installations or updates 2 USE flags 2.1 Important Portage files[i 1] 3 Log management 3.1 genlop 4 Overlays 4.1 eselect repository 4.2 Layman 5 Services 5.1 OpenRC 5.2 systemd 6 Gentoo Monthly Newsletter (GMN) 6.1 qcheck
Tableau comparatif des outils URPM YUM ZYPPER EMERGE et APT - equivalence, comparison cheat sheet
DEFINITIVE - How to convert enum names to string in c -
X Macro - C, C++
X-Macros in C - GeeksforGeeks
Code generation with X-Macros in C :: The Brush Blog
Easy way to use variables of enum types as string in C? - X-Macros
VLANs over internet - MTU, IP packets fragmentation - tunneling protocols - L2TPv3, HDLC, PPP, EVPN-VXLAN - PathMTUdiscovery - PPPoE - VXLAN, GRE, GENEVE, L2TP, MPLS-over-Ethernet
C and C++ : Partial initialization of automatic structure - Complete initialization, No-initialization - static storage duration
In c/c++, are block-scope variables stacked only if the block is executed? - Software Engineering Stack Exchange
c - Initializing a struct to 0 - Stack Overflow
c++ - Why POSIX is called "Portable Operating System Interface"? - Stack Overflow
c - Is stdin treated as a character device in Linux? - Stack Overflow
devices - What are character special and block special files in a unix system? - kernel
drivers - How do character device or character special files work? - Unix & Linux Stack Exchange
Using the GNU Compiler Collection (GCC): Designated Inits - dot struct member variables - arrays
C Preprocessor tricks, tips, and idioms · C preprocessor abuse - turing complete
Enumerations - integers - conversion - forward-declaration
x11 - How do keyboard input and text output work? - kernel
Interesting facts about switch statement in C - GeeksforGeeks
c - How does switch statement work? standard quotes - definitve
Bit bucket - Wikipedia
How are "/dev" Linux files created? /dev/zero, special files
How to Find a Tech Start-up Idea | Inc.com
What Are The Best Ways To Think Of Ideas For A Tech Startup?
IoT startups: Six with great ideas — and big funding - security, tech idea
Five Emerging Technologies Spearheading The IoT Security Research – RadioStudio
IoT Tech Ideas for Business: Connecting the World - Eastern Peak : Eastern Peak
Top IoT app ideas and IoT security enhancement with Blockchain | tech idea
5 Ways the Smartest Entrepreneurs Build Million-Dollar Brands | tech ideas
How to Make a Million Dollars By Starting Your Own Business | tech idea
Small Business Ideas and Resources for Entrepreneurs - startup resources
How to build a multi-million dollar website without spending a cent - tech ideas
25 Genius Side Hustle Ideas That Can Make $1,000,000+ Per Year - tech ideas
How to Save Money Filing Patents - tech idea
You Have a Great Tech Idea. Now What? - ReadWrite
13 wacky and original start-up tech ideas raising millions
The 12 cleverest tech ideas of 2018
How I Created A $350 Million Software Company Knowing Nothing About Software | tech idea
Top 50 Internet of Things Applications - IoT tech ideas
Top 8 IoT market trends to look out for in 2019 - tech ideas
Latest Internet of Things Trends for 2019 :: IoT Trends - tech idea
Top 7 IoT Business Tech Ideas and IoT Trends in 2019
IoT based Smart Furniture for Your Smart Home | Cuddly Home Advisors
Top 5 IoT Smart Tables for Homes and Offices
Blockchain in IoT Security? – EEJournal
Blockchain Technology Can be Critical to IoT Infrastructure Security
Leading Blockchain Integration With IoT Devices for Enhanced Security - IoTex, scale
Is Blockchain the Solution to IoT Security? - IEEE Innovation at Work
Blockchain and IoT Security: everything you need to know - Chakray
Proven Security for the Internet of Things (IoT) - trusted zone, ARM, firmware
Blockchain in Internet of Things: Challenges and Solutions - security
Design and Implementation of an Integrated IoT Blockchain Platform for Sensing Data Integrity - security
IoTChain: A Blockchain Security Architecture for the Internet of Things
Augmented chain of ownership : configuring IoT devices with the help of the blockchain - security
IoT blockchain filetype:pdf at DuckDuckGo
IoT blockchain security filetype:pdf at DuckDuckGo
Resolving IoT Security Issues with Blockchain Technology - By Stevan Mcgrath
Blockchain storage in IoT applications - Ethereum Stack Exchange
What important/crucial real-world applications use blockchain? - definitive
How to Secure the Internet of Things (IoT) with Blockchain
The Blockchain & IoT Tech Stack - By
Blockchain & IoT: What’s it all about? security, trusted execution environment
Blockchain & Internet of Things (IoT) - CoinBundle - Medium
How to Use the Industrial Internet of Things (IIoT) in Your Factory > ENGINEERING.com
8 Uses, Applications, and Benefits of Industrial IoT in Manufacturing
What is the IIoT? Everything you need to know about the Industrial Internet of Things | ZDNet
Question - Quora
Top 5 applications for the industrial internet of things - IIoT
Applications of Industrial Internet of Things (IIoT) - RF Page
12 Top Collision Avoidance Drones And Obstacle Detection Explained | crash, tech idea
Top 5 Ideas for Industrial IoT development
The Top 20 Industrial IoT Applications - tech idea
IoT’s upcoming trends and business opportunities - tech idea
Is there a way to permanently delete files on a computer where even the FBI can't find the info? secure deletion, erasure
Hackers, Activists, Journos: How to Build a Secure Burner Laptop - arch linux, coreboot, read only bios, spi pin
Hackers, Activists, Journos: How to Build a Secure Burner Laptop - arch linux, coreboot, read only bios by removing pin from SPI flash chip - encryption - state surveillance by border police
Guide to building a burner laptop and TAILS OS
Errata Security: Secure Burner laptops for DEF CON
Jump ESP, jump!: How to build a "burner device" for DEF CON in one easy step - secure
What are some niche InfoSec/Cybersecurity areas that may be ideal for launching a startup? tech idea
Blockchain in 2019: Trends and the Future - tech idea
6 Key IoT Trends and Predictions for 2019 - IoT For All - security, tech ideas
What are good Internet of Things niches? - IoT Tech Idea
Profitable IoT Niches: The Race Is On - security, industrial IoT - tech ideas
How the Internet of Things Inspired a New Startup Niche - IoT tech ideas, security
A 5-Step Formula To Find Your Niche
A 5-Step Formula To Find Your Niche - tech idea
How Startups Can Capitalize on IoT's New Co-Economy
3 Ways Entrepreneurs Are Making IoT More User-Friendly - tech idea
25 Innovative IoT Companies and Products You Need to Know - tech idea
I Launched A Tech Startup In 2017: Here’s Everything I Felt Important Enough To Write Down - tech idea
From Idea to Successful Tech Company in 8 Steps
Why can't SQL change so that injection attacks are no longer possible?
What is DNS redirection? vs DNS poisoning
HTTP Redirects with DNS, and Why HTTPS Redirects are So &!$%-ing Hard
URL redirection - Wikipedia
Zone-Téléchargement piraté, le site détrôné par son clone - Tirexo
Secure Firmware Remote Update
Is it possible to flash the Pi's firmware live? - Raspberry Pi Stack Exchange
Is there a way to update Arduino uno Over The Air - remote firmware
How to remotely update microcontrollerv MCU bootloader/firmware? - Electrical Engineering Stack Exchange
What are the best practices to implement secured remote SW updates over the air (OTA)? firmware/bootloader remote update/uprgade
Programatic FOTA (Firmware-Over-The-Air) upgrades with Uno R3 - remote firmware bootloader update
Why 'Zero Day' Android Hacking Now Costs More Than iOS Attacks | zerodium
Security Assertion Markup Language - SAML
Linux Cheat Sheet - Hakin9 - IT Security Magazine
How the Green Card Lottery Really Works - definitive guide
U.S. Diversity Immigrant Visa Program Tutorial: Submitting an Entry - green card lottery - definitive
Hackers Use A.I. Weapon to Impersonate CEO | hacking, tool, deepfake
Java DNS cache viewer - display DNS cache android
Is there a way to list the local dns cache? - display DNS cache android - Java inetAddress
Windows Registry and Log Analysis (W31) - eForensics
Firefox Monitor - Frequently asked questions | have I been pwned HIBP
Scanning for breached accounts with k-Anonymity | have I been pwned HIBP APIs
Mozilla Security Blog
What Are Zero-Knowledge Proofs? | WIRED
'Simjacker' Attack Can Track Phones Just by Sending a Text | WIRED
Grub4dos Guide - Contents
Israeli police arrest execs from vendor of mobile surveillance tech | Ability Inc., cyberwarfare
Using a VPN on Your Android TV
Hyperledger - an umbrella project of open source blockchains and related tools, started in December 2015 by the Linux Foundation,[1] and has received contributions from IBM, Intel and SAP Ariba, to support the collaborative development of blockchain-based distributed ledgers.
MultiChain | Open source blockchain platform
A Step-by-Step Guide to Building and Deploying MultiChain Private Blockchains
Multichain – Build your own Blockchain – BitcoinWiki
An Aspect-Oriented Programming Tutorial for .NET | Toptal
Google Claims ‘Quantum Supremacy,’ Marking a Major Milestone in Computing – Fortune
Diversity Visa Instructions - green card lottery
Zombie POODLE and GOLDENDOODLE Vulnerabilities | TLS, SSL
PDF encryption standard weaknesses uncovered – Naked Security
21 Essential React.js Interview Questions and Answers
Credit Card Privacy - payment card, banking, financial
CppCon 2018: Spectre: Secrets, Side-Channels, Sandboxes, and Security--Chandler Carruth : Standard C++
Default Password for GPS Trackers - Schneier on Security
The Windows 10 Privacy Settings You Should Check Right Now | WIRED
An Unprecedented Cyberattack Hit the US Power Grid | cyberwarfare
Telnet backdoor vulnerabilities impact over a million IoT radio devices | ZDNet
NotPetya - Schneier on Security
On Cybersecurity Insurance - Schneier on Security
IoT security: Now dark web hackers are targeting internet-connected gas pumps | ZDNet
Mozilla launches Firefox VPN extension for US users | ZDNet
Intel server-grade CPUs impacted by new NetCAT attack | ZDNet
C++17 - The Complete Guide now complete and available -- Nicolai M. Josuttis : Standard C++
Telegram fixes privacy-breaking bug that stopped recipient message and image deletion | ZDNet
Iranian hackers resume credential-stealing phishing attacks against universities around the world | ZDNet
C++ Core Guidelines: Profiles--Rainer Grimm : Standard C++ - coding standard
New SIM Card Flaw Lets Hackers Hijack Any Phone Just By Sending SMS
Neural implants: Why connecting your brain to a computer will create a huge headache for everyone | ZDNet
Google discloses vulnerability in Chrome OS 'built-in security key' feature | ZDNet
It's Time for IoT Security's Next Big Step | WIRED
Simjacker attack exploited in the wild to track users for at least two years | ZDNet
New Clues Show How Russia’s Grid Hackers Aimed for Physical Destruction | Ukraine 2016 - cyberwarfare
Researchers invent cryptocurrency wallet that eliminates ‘entire classes’ of vulnerabilities | hardware isolation and system resets - security
Sophos open-sources Sandboxie, a utility for sandboxing any application | ZDNet
France will attempt to block Facebook’s Libra cryptocurrency on European soil | ZDNet
Smart Watches and Cheating on Tests - IoT
When Biology Becomes Software - Schneier on Security - biotechnology
Constraint programming by example | Opensource.com
Popular consumer and enterprise routers, IoT devices contain remote access vulnerabilities | ZDNet
Another Side Channel in Intel Chips - Schneier on Security
Malware called InnfiRAT is creeping into cryptocurrency wallets
Talking to machines: Lisp and the origins of AI | Opensource.com
The Air Force Will Let Hackers Try to Hijack an Orbiting Satellite | WIRED
Cyberattackers now pose as business executives to secure security certificates | rogue CA, fake certificate injection
Blind Spots in AI Just Might Help Protect Your Privacy | WIRED
Google Maps gets an Incognito Mode, but it can't hide your geolocation from everyone | physical privacy
Just a GIF Image Could Have Hacked Your Android Phone Using WhatsApp - vulnerability
The Ukraine Whistle-Blower Did Everything Right | cyberwarfare
Iranian Hackers Targeted a US Presidential Candidate | cyberwarfare
Meet 'Project Zero,' Google's Secret Team of Bug-Hunting Hackers | WIRED
GitHub - decoxviii/userrecon-py: Username recognition on various websites - enumeration, detection, osint
Edward Snowden's Memoirs - Schneier on Security
How Ansible brought peace to my home | Opensource.com
GitHub - CapacitorSet/box-js: A tool for studying JavaScript malware.
New Unpatchable iPhone Exploit Allows Jailbreaking - Schneier on Security
Why to choose Rust as your next programming language | Opensource.com
A Controversial Plan to Encrypt More of the Internet | DNS over TLS
Cheating at Professional Poker - Schneier on Security
Twitter Puts Profit Ahead of User Privacy—Just Like Facebook Did Before | twitter, privacy
DevSecOps pipelines and tools: What you need to know | Opensource.com
Wi-Fi Hotspot Tracking - Schneier on Security
DEF CON® Hacking Conference - hacking resources
How to Attend Defcon Without Looking Like a Noob or Spending a Fortune - Black Hat conferences
Could I use a Raspberry Pi to mine Monero? - Monero Stack Exchange
What is the best hardware wallet for Monero? - Monero Stack Exchange
How often does Tor send a heartbeat in a circuit? - Tor Stack Exchange
Financial Cost of Running an exit node - Tor Stack Exchange
What are the best Tor2Web anonymous gateways? - Tor Stack Exchange
How do onion addresses exactly work? definitive explanation - hidden services
Tor Bookmarks file location - firefox - sqlite database - profile .default
Will the size of Bitcoin core full-node be too big to run on a normal computer? - blockchain size, Validation complexity
How do I sign a bitcoin transaction in Python? - Bitcoin Stack Exchange
What would happen if you send Bitcoin (BTC) to a Bitcoin Cash (BCH, aka BCC) address? - cryptocurrencies compatibility
Where do the dollars go? - definitive insights on cryptocurrency basics and fundamentals - how to buy bitcoin
How to transfer bitcoins to my Indian bank or PayPal account? - liquidify cryptocurrency - cash out
SHELLTEA + POSLURP MALWARE MEMORY - RESIDENT point of sale PoS malware attacks industry
PenTest: Purple Teaming - Pentestmag
Undocumented Model-Specific Register on Broadwell Microarchitecture - MSRs
Mach-O ARM64 using literal values instead of a frame pointer (BP) register - ebp, esp, x29 - vs ARM - alloca() function
How can I reverse optimized integer division/modulo by constant operations? - decompilation challenge
convert this x86 ASM to C? decompilation challenge
SSH from a shared workplace computer - authentication, SSH keys vs password, HashKnownHosts
Why are KDFs slow? Is using a KDF more secure than using the original secret? - curve 25591, PRF
How can I verify my browser/OS's top level certificate? - CAs, root
What are some of the benign use cases of injecting bytes into another process and creating remote thread? antivirus
Is storing files under a web server root unsafe if it is handled by PHP and blocked by the web server site configuration file? - permissions, executable bit -
Difference between linux hash sum utilities and online string to hash utilities - echo -n newline - sha256sum
SSL3 "POODLE" Vulnerability - Information Security Stack Exchange
Is MQTT-SN still "new" or is it obsolete? - Internet of Things Stack Exchange
Are nodes that are mobile in a IoT network more vulnerable to certain types of attacks? - Internet of Things Stack Exchange - security
Do pure states lie on a hypersphere in the Bloch representation? - Quantum Computing Stack Exchange
Physical Interpretation of Pauli Matrices as Polarization Check - Bloch sphere, eigenvector
Applications of quantum computing for science popularization - applications, drug discovery startups
Quantum Supremacy: Some questions on cross-entropy benchmarking - Google quantum supremacy paper
How to prepare an initial state for variational quantum algorithms? - Quantum States - Hamiltonian -Trotterization/VQEs/Qubitization
How to construct a multi-qubit controlled-Z from elementary gates? - Quantum Computing Stack Exchange
Quantum states are unit vectors... with respect to which norm? - unitarity - definitive
What counts as an "ancilla" qubit? - ancillary, auxillary
Currently, what are the best structured courses available online on quantum computing? - definitive list of courses, tutorials and academic resources
How to construct matrix of regular and "flipped" 2-qubit CNOT? pauli gate
Ehtools - Framework Of Serious Wi-Fi Penetration Tool
Nmap Cheat Sheet - Hakin9 - IT Security Magazine Nmap Cheat Sheet
Going Serverless? Common Serverless Security Issues and Best Practices
The Offensive Manual Web Application Penetration Testing Framework - hacking tool
Fingerprinting WAF with Burp [ FREE COURSE CONTENT] -
Web Application Hacking: Advanced SQL Injection and Data Store Attacks (W29) - Hakin9 - IT Security Magazine
Bypassing Web Application Firewall (W30) - Hakin9 - IT Security Magazine
Is My VPN Secure: 4 Ways to Ensure Protection • privacy, anonymity, webRTC
A Study of WebRTC Security · A Study of WebRTC Security
draft-ietf-rtcweb-security-arch-20 - WebRTC Security Architecture
Are there any security concerns regarding WebRTC? - Quora
The WebRTC Security Flaw That’s Leaking IP Addresses – StrongVPN.com Blog
3CX - WebRTC: Secure or Not
What is WebRTC Leak? How to Disable it? | NordVPN
How are some websites able to get my private IP address? ISP, shared external IP, internal IP exposed to detect abuse - mobile data access point
WebRTC Leak Test: Prevent IP Address Leaks | privacy test tool
Is Your VPN Leaking Your IP Address? WebRTC Test.
WebRTC Leaks Vulnerability - SOLVED (For All Browsers) - definitive
The WebRTC VPN “Bug” and How to Fix It
Learn how to protect your digital privacy and stay safe online - ProPrivacy - resources, reference
IP/DNS Detect - What is your IP, what is your DNS, what informations you send to websites. - privacy test tool
WebRTC Leak Test | Perfect Privacy prevents WebRTC Leaks
How to Stop Web RTC Leak (Free and Easy Fixes) - Privacy Australia
Privacy Australia - privacy anonymity resources, reference - vpn
Web Browsers | privacytools.io - privacy respectuous alternatives
draft-ietf-rtcweb-ip-handling-12 - WebRTC IP Address Handling Requirements
Don't Let Your VPN Spring a Leak! webrtc
Web Browsers | privacy add ons, tools - webrtc - about:config - firefox, chrome
How does a "What is my IP" site know my internal LAN address? webrtc
Sudo Flaw Lets Linux Users Run Commands As Root Even When They're Restricted
How to Encrypt and Urgently Wipe your Data Securely - secure deletion
Pre-encryption wipe, why? secure deletion - single vs multiple passes
Building a Micro-frontend Framework | Toptal
VPN Encryption Types | OpenVPN, IKEv2, PPTP, L2TP/IpSec, SSTP
Site-to-Site VPN on a Single Host Using OpenVPN - Bilal Jammal - Medium
PPTP vs. IPSec vs. OpenVPN - What are the differences? - Shellfire Blog
Site-to-site VPN vs. remote-access VPNs: What's the difference?
What are the differences between OpenVPN and IPsec Tunnel – EMnify
OpenVPN vs. IPsec - Pros and cons, what to use? - Server Fault
PPTP vs IPSec IKEv2 vs OpenVPN vs WireGuard
For more security: overwrite empty disk space - Ask Ubuntu
Encrypt: Overwrite empty disk space bad for SSD drives? Full Disk Encryption FDE, secure deletion
Ubuntu installer overwrite empty disk space - cryptsetup, dm-crypt, LUKS - full disk encryption FDE, secure deletion
LUKS overwrite empty disk space question - full disk encryption FDE, secure deletion
Grub2/Installing - Community Help Wiki
How does Linux deal with a separate /boot partition? - Unix & Linux Stack Exchange
How do I install GRUB to a partiton and not MBR? - Super User
Site To Site VPN Routing Explained In Detail | OpenVPN
Which is the Best VPN Protocol? PPTP vs. OpenVPN vs. L2TP/IPsec vs. SSTP
Unique Hamstring Warm Up And Strengthening Exercises - definitive
Dynamic Warmup Drills for Speed Training
Chronic Hamstring Problems in Sprinters: Management and Recovery
Decompiler attack - IDA Hex Ray, Ghidra security vulnerabilities
SD card microcontroller - firmware dump, SPI
Detecting tracing in Linux - ptrace, strace, LD_DEBUG
Is it possible to access the higher part of the 32-bit and 64-bit registers? If so, which ones? al, ah, eax, rax -
If we should encrypt the message rather than the method of transfer, why do we care about wifi security? Is this just security theatre?
Does code obfuscation give any measurable security benefit? - Information Security Stack Exchange
How do social media apps notify you when someone else takes a screenshot of your profile? privacy, android, iOS
How to protect yourself against OSINT? privacy, anonymity
Putty store cleartext credentials in the Windows Registry; isn't that a very insecure approach? security through obscurity - secure password storage
Why is it wrong to *implement* myself a known, published, widely believed to be secure crypto algorithm? side channel attack definitive explanation - rolling.out own encryption/cryptosystem/ cryptographic protocol implementation
How do RF remote clones manage to clone rolling codes? rolljam attack, smart car hacking, IoT security - security key fob - radio frequency -
What's the difference between analogWrite and digitalWrite? - Arduino Stack Exchange
Reset an Arduino Uno in code - Arduino Stack Exchange
Is there any way to download a sketch from an Arduino? dump binary
What are the fundemental differences of different Bluetooth modules for beginners? HC-05 HC-06 HC-07
Where are the uarts on the raspberry pi 4? - Raspberry Pi Stack Exchange
How to handle a supposedly corrupt boot partition? - Raspberry Pi Stack Exchange
Does directly connecting pins fry the Pi? GPIO
What do the LEDs on the B+ mean? blinking pattern meaning - flash code
How do I update software and firmware? GPU firmware, kernel
Differences between /etc/dhcpcd.conf and /etc/network/interfaces? - Raspberry Pi Stack Exchange
Prepare SD card for Wifi on Headless Pi - /boot/wpa_supplicant.conf, /etc/wpa_supplicant/wpa_supplicant.conf - WiFi configuration files, SSID, passwd
Prepare for ssh without a screen - backup boot.rc on the boot partition on the SD image and replace it with boot_enable_ssh.rc
How can I extend the life of my SD card? - swap, journalling filesystem
File System Forensics - vdfs, ext4, malware analysis
NTFS Forensics (W40) - eForensics
DEFINITIVE - Eight Habits of Expert Software Designers: An Illustrated Guide | tech idea development, software design
The Obvious UI is Often the Best UI - Google Design - graphical user interfaces GUI
How to encrypt sensor data in low-power wireless communication like LoRa, BLE, ...? security in embedded system
What is the simplest programmable IoT device that can connect to Wi-Fi? - Internet of Things Stack Exchange
Free MQTT brokers - Internet of Things Stack Exchange
What is meant by "Noisy Intermediate-Scale Quantum" (NISQ) technology? - Quantum Computing Stack Exchange
Are quantum computers just a variant on Analog computers of the 50's & 60's that many have never seen nor used? skepticism
Are there any organised resources available from where I can begin my quantum computing studies? - Quantum Computing Stack Exchange
Does a study guide exist that starts from a "purely CS background" and advances towards "making a new quantum programming language"? - resources
Introductory material for quantum machine learning - resources
What is the difference between QAOA and Quantum Annealing? - Quantum Computing Stack Exchange
Is encrypted e-mail sent over TLS 1.3 a form of "forward secrecy" (similar to something like Signal)? - Cryptography Stack Exchange
Are there any known problems or attacks for using SHA1(AES_key) as the HMAC key? - Cryptography Stack Exchange
TLS 1.3 Security against PKCS#1v1.5 - side channel attack
Property of a good cipher system - Cryptography Stack Exchange - DES - Avalanche Effect
How should I calculate the entropy of a password? - Cryptography Stack Exchange
Impacts of not using RSA exponent of 65537 - Fermat primes
How is XOR used for encryption? - Cryptography Stack Exchange - one time pad otp, threefish, aes, idea
International Data Encryption Algorithm - idea
Why do block ciphers need a non-linear component (like an S-box)? - Cryptography Stack Exchange
How is CipherCloud doing homomorphic encryption? - Cryptography Stack Exchange
The MacOS Catalina Privacy and Security Features You Should Know | WIRED
The Air Force Ditches Its Nuclear Command Floppy Disks | nuclear nukes launch process, Olympic cyber attack, cyber warfare, cosy bear
At an Outback Steakhouse Franchise, Surveillance Blooms | machine learning, ai, facial recognition - statistics, privacy
Microsoft to Reward Hackers for Finding Bugs in Open Source Election Software - voting machine security
Adding a Hardware Backdoor to a Networked Computer - Schneier on Security
Fake Tor Browser steals Bitcoin from Dark Web users | security
Sudo Flaw Lets Linux Users Run Commands As Root Even When They're Restricted
GitHub - Samsung/cotopaxi: Set of tools for security testing of Internet of Things devices using specific network IoT protocols
Facebook Now Pays Hackers for Reporting Security Bugs in 3rd-Party Apps - bug bounty
Cracking the Passwords of Early Internet Pioneers - strength, length
GitHub - PAGalaxyLab/uniFuzzer: A fuzzing tool for closed-source binaries based on Unicorn and LibFuzzer - Currently it supports fuzzing 32-bits LSB ELF files on ARM/MIPS, which are usually seen in IoT devices
Why does hashing public keys not actually provide any quantum resistance? - cryptocurrency, blockchain
How can I protect my funds in the event a quantum computer breaks the ECDLP that Bitcoin relies on? - Bitcoin Stack Exchange
Can we shutdown a blockchain? - Bitcoin Stack Exchange
Can someone explain how the Bitcoin Blockchain works? - Bitcoin Stack Exchange - definitive simple explanation
How many bitcoins will there eventually be? - Bitcoin Stack Exchange - reward schedule
How do I cancel my blockchain transaction (still unconfirmed)? - Bitcoin Stack Exchange - double spend
Hidden Service in TestingTorNetwork connected to non-Exit Nodes - Tor Stack Exchange
How come is Firefox over TOR capable of reaching TOR services? - Tor Stack Exchange -socks5 proxy
How do I install tor on arch in a country where tor is blocked? - Tor Stack Exchange
List of attacks on Tor - Tor Stack Exchange
Why does Tor use more relays when connecting to .onion site than to normal one? - Tor Stack Exchange - hidden
What happened to torrc in Tor Browser Bundle? - Tor Stack Exchange
Can I exit from a specific country or node? - Tor Stack Exchange - VPN, netflix
How do I move the Monero blockchain files safely? - Monero Stack Exchange - wallet
How Can SEO Help Increase Website Security? Search Engine Optimization
NetCAT: New Attack Lets Hackers Remotely Steal Data From Intel CPUs - NetCAT, short for Network Cache ATtack, the new network-based side-channel vulnerability could allow a remote attacker to sniff out sensitive data, such as someone's SSH password, from Intel's CPU cache.
How Linux came to the mainframe | Opensource.com
VM escape flaw in QEMU allows for arbitrary code execution, denial of service | virtual machine escape, hypervisor vulnerability - security
GitHub - alexdetrano/4CAN - modern car controller area network hacking tool - security
Detecting Credit Card Skimmers - Schneier on Security - bluetana - banking security - Bluetooth
SS7 Phone-Switch Flaw Enabled Surveillance - Schneier on Security - Clive Robinson analysis
OpenAI Said Its Code Was Risky. Two Grads Re-Created It Anyway | artificial intelligence risks
Solving the Cyber Security Problem: Mission Impossible
Alleged 'Snake Oil' Crypto Firm Sues Over Boos at Black Hat | RSA breaking, cryptanalysis , semi primes
Cryptocurrency Mining Employees Expose Nuclear Plant to Internet | cyber warfare
We love a good pen plotter - Raspberry Pi - project
Python programming language: A cheat sheet - TechRepublic
DEFINITIVE - SSD vs HDD Tested: What’s the Difference and Which Is Better? secure deletion/erasure
How to compile a Linux kernel in the 21st century | Opensource.com
GitHub - abhi-r3v0/EVABS: pentestable vulnerable by design target. An open source Android application that is intentionally vulnerable so as to act as a learning platform for Android application security beginners. The effort is to introduce beginners with very limited or zero knowledge - Extremely/Damn Vulnerable Android Labs
C++ Core Guidelines: More Non-Rules and Myths - coding standard
Hong Kong protesters warn of Telegram feature that can disclose their identities | secure private messaging app vulnerability
What Is Cyberwar? The Complete WIRED Guide | WIRED
Google Proposes 'Privacy Sandbox' to Develop Privacy-Focused Ads
GitHub - nettitude/PoshC2_Python: Python Server for PoshC2 - control and command -red teaming, post-exploitation and lateral movement - Powershell
The Android 10 Privacy and Security Upgrades You Should Know About | WIRED
Modifying a Tesla to Become a Surveillance Platform - Schneier on Security - cars, privacy, surveillance, tracking
Meet Utopia; a privacy focused decentralized P2P ecosystem - definitive - peer to peer
Russian Hacking Group Targeting Banks Worldwide With Evolving Tactics
Facebook’s New Privacy Feature Comes With a Loophole | WIRED
Hackers cloned NordVPN website to drop banking trojan
A Huge Ransomware Attack Messes With Texas - cyber warfare
Use This Privacy Tool to View and Clear Your 'Off-Facebook Activity' Data
C++11 lambdas can access my private members. Why? - Stack Overflow
Surveillance as a Condition for Humanitarian Aid - Schneier on Security
Cybersecurity Firm Imperva Discloses Breach — Krebs on Security
Hackers Could Steal a Tesla Model S by Cloning Its Key Fob—Again | WIRED
The Myth of Consumer-Grade Security - Schneier on Security - consumerization, encryption, essays, national security policy, NSA, security engineering, vulnerabilities - state surveillance
Elon Musk and Jack Ma disagree about AI's threat - BBC News
Mysterious iOS Attack Changes Everything We Know About iPhone Hacking | WIRED
More Myths of My Blog Readers - ModernesCpp.com
Massive iPhone Hack Targets Uyghurs - Schneier on Security - anti Muslim state surveillance - china
Cold War Analogies are Warping Tech Policy | cyber arm race, cyberwarfare
Flaws in Over Half a Million GPS Trackers Expose Children Location Data
7 Tips to Increase Your Wordpress Security
Apple Finally Breaks Its Silence on iOS Hacking Campaign | WIRED
Mozilla to gradually enable DNS-over-HTTPS for Firefox US users later this month | ZDNet
Facebook Patches "Memory Disclosure Using JPEG Images" Flaws in HHVM Servers - attack, HipHop Virtual Machine
JTAG - Joint Test Action Group - TAP, storing firmware, debugging
How I’d Hack Your Weak Passwords - strength, length
Linux Shell Internals - Command-Line Processing - definitive diagram in depths explanation
Linux's eval command and security issues - BashFAQ/048 - Greg's Wiki
My OSCP Guide: A Philosophical Approach bu Samuel Whang | Offensive Security
How Secure Is My Password? strength, length
Talent vs Luck - the role of randomness in sucess - tech ideas, entrepreneurship
Messages show Boeing employees knew in 2016 of problems that turned deadly on the 737 Max - The Washington Post
Boeing Pilot Complained of ‘Egregious’ Issue With 737 Max in 2016 - The New York Times
Firefox's New WebSocket Inspector - Mozilla Hacks - the Web developer blog
Pete Shirley's Graphics Blog: How to succeed as a poor programmer - software design, guidelines, kiss principle
Firefox fait un sans faute lors d'un audit réalisé par l'agence allemande de sécurité informatique, qui le recommande comme étant le navigateur le plus sécurisé - secure browser, security
Malware That Spits Cash Out of ATMs Has Spread Across the World - banking security
Without encryption we will lose all privacy. This is our new battleground | Edward Snowden | government state surveillance
Binary vs. ASCII file size - Computational Science Stack Exchange
Bitcoin Rich List - Reliable or not? - wealth distribution
Why can't a longer key combat quantum computers? quantum computing vs classical electronic computing model - shor's algorithm, elliptic curves
Which wallets support Bitcoin Cash? - Bitcoin Stack Exchange
Wireless card for a DIY Linux router/firewall -
Reactive Apps with Redux, RxJS, and Redux-Observable | Toptal
How to convert char[12] to byte[6] - Arduino Stack Exchange
What is the difference between Serial.write and Serial.print? And when are they used? - Arduino Stack Exchange
What overheads and other considerations are there when using a struct vs a class? - Arduino Stack Exchange
When should you use a class vs a struct in C++? - Stack Overflow
DEFINITIVE Networking Guide for Raspberry Pi - "How do I set up networking/WiFi/static IP address? - Raspberry Pi Stack Exchange
Finding OEP in a VMProtect v3.0 protected malware - malware unpacking anti-debugging anti-dumping
What is a good tools to reverse the effects of Minify on JavaScript? - obfuscation
Possibilities for reverse engineering an ipa file to its source - resources on ipohone ios apple application security, hacking - Hopper - FairPlay (Apple's proprietary DRM) -
Modify code with ILSpy - Reverse Engineering Stack Exchange - disassembly .net c#
Is Bcrypt a hashing algorithm or is my study material wrong? vs password-based key derivation function - definitive comparison
Is exploit-free software possible? - unhackable security - vulnerability, proven security - sel4 microkernel
Why are my plastic credit card and activation code sent separately? - credit-card physical banks , banking
Why do some web servers still provide information on vendor and version in the HTTP response headers - Information Security Stack Exchange - scanning, active reconnaissance, fingerprinting, version detection, nmap
Is Dom based XSS still a valid security concern in modern browsers? - Information Security Stack Exchange
Securely displaying hidden integers with MD5 - Information Security Stack Exchange -hash, brute-force cracking, md5
As a website admin I could see encrypted passwords. Is this ok? - Information Security Stack Exchange - bcrypt, argon2, password hashing, password communication
Getting spam calls from numbers similar to my own - Information Security Stack Exchange - caller ID spoofing
Security levels in NIST Post-quantum project: e.g. AES-128 vs SHA-256 - hash aes collision-resistance sha-256 brute-force-attack
What security do Cryptographic Sponges offer against generic quantum attacks? - hash post-quantum-cryptography sha-3 keccak
What is the purpose of salting when integrating PBKDF2 with AES? -Nvidia GTX 1080 hashcat performance, pbkdf2, argon - definitive
Differential cryptanalysis - Wikipedia
Academic breach revealed too late - Cryptography Stack Exchange - Flame had used an independently developed chosen-prefix attack on MD5 (paywall-free preprint) - cyberwarfare cyber security - flame malware USA israel against iran nuclear program
Is SSH over TLS 1.2/1.3 overkill? - Cryptography Stack Exchange
What are the implications of the new alleged key recovery attack preprint on SIMON? - Cryptography Stack Exchange - zero knowledge proof
Can I remove newlines in a public key? - The RSA standards (e.g. RFC 2459) only define a binary representation for keys. In practice, like OpenPGP keys (RFC 4880), they are often encoded in base 64 using the otherwise obsolete PEM standards (RFC 1421).
What does Google's claim of "Quantum Supremacy" mean for the question of BQP vs BPP vs NP? - complexity-theory quantum-advantage bqp google-sycamore - BQP ≠ BPP, P ≠ NP -
Is quantum complexity basis-invariant? -complexity-theory non-locality, computational basis
Why does Google's quantum processor outperform IBM's? - quantum-advantage ibm google-sycamore, 53 qubit quantum cpu
What's the difference between a microprocessor and a CPU? - Electrical Engineering Stack Exchange
Why do the IBM and Google processors both have 53 qubits? - physical-qubit quantum-advantage ibm google-sycamore
What is the difference between transmon and Xmon qubits? - physical-qubit architecture superconducting-quantum-computing
What's the Difference between T2 and T2*? - decoherence solid-state
Remote desktop software - remote access trojan, RAT, sometimes called creepware is a type of malware that controls a system through a remote network connection. While desktop sharing and remote administration have many legal uses, "RAT" connotes criminal or malicious activity
Do Vehicles Use PLC's? | CAN (closed area network). The most important module in a vehicle is the PCM (power control module), sometimes called the ECM (engine control module) - microcontroller, FPGAs
Hamstring tendonitis: Symptoms, treatment, and exercises
Recovering from a Hamstring Strain
Pulled Hamstring: Causes, Symptoms, Recovery and Treatment
What If Your Thigh Pain Isn’t a Hamstring Strain and What to Do About It – iRunFar.com
Blackhat movie brings some hacking realism to Hollywood, but to what effect? | Ars Technica
Blackhat movie: The Good, the Bad, and the Ugly | CSO Online
How Technically Accurate is Blackhat the Movie?
‘Blackhat’ Security Consultants Explain the Movie’s Insane Climax - VICE
How realistic is the hacking depicted in Blackhat? - Movies & TV Stack Exchange
Blackhat movie Shows Us the Power of Hackers; But Is It Accurate?
'Blackhat' movie bores, but at least gets hacking right | Engadget
Is Blackhat the Greatest Hacking Movie Ever? Hackers Think So | WIRED
Stick with Call of Duty: You Have Almost No Chance of Joining the Delta Force | warfare
How America's Cyber Strategy Could Create an International Crisis | cyberwarfare
Networking Cheat Sheets - definitive list - scapy, tcpdump
PacketLife.net - networking resources
Books - PacketLife.net - networking - recommended list
New Kid on the Web: A Study on the Prevalence of WebAssembly in the Wild - malicious cryptocurrency mining, JavaScript, obfuscation
PHP :: Sec Bug #78599 :: env_path_info underflow in fpm_main.c can lead to RCE - remote code execution
GitHub - neex/phuip-fpizdam: Exploit for CVE-2019-11043 - This is an exploit for a bug in php-fpm (CVE-2019-11043). In certain nginx + php-fpm configurations, the bug is possible to trigger from the outside. This means that a web user may get code execution if you have vulnerable config
PHP Remote Code Execution RCE 0-Day Discovered in Real World CTF Exercise - PHP
Should We Rebrand JavaScript? ECMAScript - renaming
In the Footsteps of a Sextortion Campaign - Check Point Research - botnet, ddos, blackmail, cyber crime
Robot hotel operator announces modification to prevent hacks by guests - IoT, NFC
6 remarkable features of the new United Nations open source initiative - security
Opinion: Don't Let a Tech Slowdown Threaten Our Military | cyber warfare
Resources for Measuring Cybersecurity - risk assessment
Pegasus breach: India denies WhatsApp hack amid outrage - Pegasus malware, nso group israeli firm
Awk one-liners and scripts to help you sort text files | Opensource.com
Product vs. project in open source | Opensource.com
Mozilla to stop supporting sideloaded extensions in Firefox | Firefox users won't be able to sideload extensions starting March 2020, with Firefox 74 - abuse, security
'I was a victim of the WhatsApp hack' - NSO Group, israeli firm, pegasus malware
This aggressive IoT malware is forcing Wi-Fi routers to join its botnet army | Gafgyt malware, also known as Bashlite
GEDmatch highlights security concerns of DNA comparison websites | privacy, anonymity
A Broken Random Number Generator in AMD Microcode - Schneier on Security -BIOS, firmware, hardware, random numbers, RNG, Fortuna
Chinese Hackers Compromise Telecom Servers to Spy on SMS Messages - cyber warfare
Why you don't have to be afraid of Kubernetes | Opensource.com
Advance your awk skills with two easy tutorials | definitive resources
Most Singapore firms still can't keep up with security patches | policy
5 Places Where Hackers Are Stealthily Stealing Your Data In 2019 - code repositories, devsecops dast,sast,iast - cloud
Hackers who extorted Uber and LinkedIn plead guilty | hacker arrested
Ubisoft reports 93% drop in DDoS attacks after pushing back against attackers | ddos for hire providers
Top Linux developer on Intel chip security problems: 'They're not going away.' | SMT Simultaneous MultiThreading, Flush CPU Buffers, context switchs, MDS, RDDL, Fallout, Zombieland,RIDL- Intel Software Guard Extensions (SGX)
Extending cybersecurity awareness of the third-party ecosystem | ZDNet
Largest cyber-attack in Georgia's history linked to hacked web hosting provider | cyber warfare
NordVPN introduces bug bounty program as part of security overhaul | ZDNet
Hackers Target Indian Nuclear Power Plant – Everything We Know So Far - cyberwarfare
Confirmed: North Korean malware found on Indian nuclear plant's network |Two days after rumors of a malware infection at the Kudankulam Nuclear Power Plant surfaced on Twitter, the plant's parent company confirms the security breach - cyber warfare
WhatsApp's Case Against NSO Group Hinges on a Tricky Legal Argument | WIRED
How to Keep Your Siri, Alexa, and Google Assistant Voice Recordings Private | privacy, smart home, IoT
Facebook Sues Israeli NSO Spyware Firm For Hacking WhatsApp Users
Mind-reading technology: The security and privacy threats ahead |
Facial recognition: This new AI tool can spot when you are nervous or confused | ZDNet
Artificial intelligence: Cheat sheet - AI, cyber security, fraud detection
How to Implement AI and Machine Learning | Artificial Intelligence
ICT Supply-Chain Security - information and communication technologies - policy, hacking
Mysterious Xhelper malware that re-installs itself infected over 45,000 Android Phones
Major vulnerability patched in the EU's eIDAS authentication system | electronic IDentification, Authentication and trust Services. It is a very complex, cryptographically-secured electronic system for managing electronic transactions and digital signatures between EU member states, citizens, and businesses - cyber warfare -
GitHub - devploit/XORpass: Encoder to bypass WAF filters using XOR operations
Demystifying namespaces and containers in Linux | Kubernetes, Docker, CoreOS, Silverblue, or Flatpak 
What you probably didn’t know about sudo | sudoers syntax, digest verification, aliases, session recording
Sudo Blog - definitive reference, documentation
Sudo Main Page - definitive resource, reference, doc
Russian Hackers Are Still Targeting the Olympics | cyber warfare
AddressSanitizer (ASan) for Windows with MSVC--Augustin Popa : Standard C++
Congress Still Doesn't Have an Answer for Ransomware | cyber warfare
GitHub - lockedbyte/cryptovenom: Cryptovenom: The Cryptography Swiss Army Knife
How to remove duplicate lines from files with awk | Opensource.com
TikTok, Under Scrutiny, Distances Itself From China | cyberwarfare, spying
How 18 Malware Apps Snuck Into Apple's App Store | WIRED
Why Keybase Doesn't Offer Two Factor Authentication | WIRED
GitHub - ElevenPaths/HomePWN - smart home, IoT security pentesting, hacking, iiot
Mapping Security and Privacy Research across the Decades - academic papers, computer security, history of security, privacy
New Cache Poisoning Attack Lets Attackers Target CDN Protected Sites - cpdos, ddos, http, CVE-2019-0941
CPDoS: Cache Poisoned Denial of Service
NordVPN Breached - breaches, certificates, cryptography, disclosure, encryption, keys, VPN - protonvpn - advantages disadvantages vpns, vulnerabilities
Calculating the Benefits of the Advanced Encryption Standard - Schneier on Security -AES, cryptography, history of cryptography, NIST
It's Time to Outsource Your Passwords to an App |Bitwarden, 1Password, Dashlane, LastPass - password managers
NordVPN definitive Breach FAQ – What Happened and What's At Stake?-TorGuard and VikingVPN
Avast, NordVPN Breaches Tied to Phantom User Accounts — Avast breach, FileHippo, Jaya Baloo, Kenneth White, NordVPN breach, Open Crypto Audit Project, Secunia Personal Software Inspector, supply chain attack, Techcrunch, Zack Whittaker
Avast: No plans to discontinue CCleaner following second hack in two years | cyberwarfare, China
NordVPN confirms data center breach | The company said an attacker gained access to a server at a data center in Finland by exploiting an insecure remote management system left by the data center provider.
ASIO turning to AI to avoid missing things | Australian Security Intelligence Organisation, spying, cyberwarfare, government surveillance, artificial intelligence tools
GitHub - arthastang/IoT-Implant-Toolkit: Toolkit for implant attack of IoT devices - software tools on firmware modification, serial port debugging, software analysis and stable spy clients
How to Control the Privacy of Your Facebook, Instagram, Twitter, and Snapchat Posts | Facebook, Instagram, Twitter, and Snapchat Posts
GitHub - Anon-Exploiter/SUID3NUM: A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom binaries, cross-match those with bins in GTFO Bin's repository & auto-exploit those - vs LinEnum - local enumeration, privilege escalation
C/C++ Include Guidelines - BCP, good practices
Alexa and Google Home devices leveraged to phish and eavesdrop on users, again | smart home, IoT privacy
Former Twitter CISO shares his advice for IT security hiring and cybersecurity | company wise, ciso
Pylint: Making your Python code consistent | continuous integration, design, refactoring
How to build a Flatpak | A universal packaging format with a decentralized means of distribution. Plus, portability and sandboxing.
How to program with Bash: Syntax and tools | Opensource.com
Russian hackers cloak attacks using Iranian group - BBC News
Russian hackers cloak attacks using Iranian group - turla, oilrig groups, cyber warfare
CAR-2019-04-001: UAC Bypass | MITRE Cyber Analytics Repository - user account control
Welcome to the Cyber Analytics Repository | MITRE Cyber Analytics Repository - MITRE Cyber Analytics Repository (CAR) is a knowledge base of analytics developed by MITRE based on the MITRE ATT&CK adversary model. If you want to start exploring, try viewing the Full Analytic List or use the CAR Exploration Tool (CARET). Also, check out the new ATT&CK Navigator Layer that captures the current set of ATT&CK tactics and techniques covered by CAR. - definitive knowledge base for mitigation analytics technique
Avast says hackers breached internal network through compromised VPN profile | ccleaner
Russian APT Turla targets 35 countries on the back of Iranian infrastructure | oilrig group, cyber warfare
Details of the Olympic Destroyer APT -  advanced persistent threats, attribution, cyberattack, North Korea, Russia, cyberwarfare
GitHub - mushorg/snare: Super Next generation Advanced Reactive honEypot -SNARE is a web application honeypot sensor attracting all sort of maliciousness from the Internet.
17 Best Free Movie Streaming Sites Without Sign Up 2019 - to integrate in kodi's vstream addon
Key Concepts in Encryption | Surveillance Self-Defense - certificates, public private key cryptography - definitive introduction
Upcoming changes to extension sideloading | Mozilla Add-ons Blog
SURVEY OF ANTI-TAMPER TECHNOLOGIES - DRM digital rights management - anti cracking hacking, code obfuscation, watermarking
What is Forensic Watermarking? (And How to Combine it with Blockchain for DRM) - Forensic watermarking is the process of hiding identifying information in each individual copy of a video file - digital rights management
Securing OTT Content — Watermarking - bitstream base / manifest based watermarking - forensic watermarking, DRM Digital Rights Management, Over the top OTT, VOD content
Over-the-top media services - Over the top (OTT) media service is a streaming media service offered directly to viewers over the Internet. OTT bypasses cable, broadcast and satellite television platforms that traditionally act as a controller or distributor of such content - TV, Messaging, Voice calling
Voice over IP - Wikipedia
The Future of DRM & Content Protection - Decentralized Leak Detection - forensic watermarking, blockchains
Forensic Watermarking Technologies and Applications - definitive breakdown - OTT - anti piracy, DRM
Fix Android USB Device Not Recognized but Charging Problem - troubleshooting, maintenance, usb tethering not detected
Android USB Connections Explained: MTP, PTP, and USB Mass Storage
PE Injection: Executing PEs inside Remote Processes - Red Teaming Experiments - portable executable DLL injection hacking lab
Retro-engineering - can refer to: Personalization, adaptation or retrofitting of a product or device that was not intended to be modified - Reverse engineering, the process of discovering the technological principles of something by analysis of it
Hackers can hijack smart speakers with a $14 laser - IoT smart homes, embedded
Domain generation algorithm - DGA - algorithms seen in various families of malware that are used to periodically generate a large number of domain names that can be used as rendezvous points with their command and control servers C2
eWPTX - eLearnSecurity Web application Penetration Tester eXtreme - eLearnSecurity -eLearnSecurity Web application Penetration Tester eXtreme and it is next step to the eWPT certification. eWPTX is the most practical and advanced certification available on the market for the assessment of web application penetration testing skills. By passing the challenging exam and obtaining the eWPTX certificate, a penetration tester can prove their advanced skills in the fastest growing area of application security.
AWAE and the OSWE Certification | Offensive Security
JavaScript — Double Equals vs. Triple Equals - codeburst
Certified Ethical Hacker - CEH Certification
Offensive Security Certified Professional - OSCP Certification - CEH
Online Certificate Status Protocol (OCSP) stapling, formally known as the TLS Certificate Status Request extension, is a standard for checking the revocation status of X.509 digital certificates.
BBC - Travel - How to plan a round-the-world trip
BBC - Travel - Tools to plan your itinerary faster
How I Saved Money For Travel (You Don't Need To Be Rich) • Expert Vagabond
Black Hat USA 2019 | cyber security conference - Trainings Schedule
Tips for Attending Black Hat cyber security conference USA 2019: Las Vegas, NV | LaunchTech
DEF CON® Hacking Conference - Frequently Asked Questions
The Pros of Attending Cons: Why Conferences Offer the Best cyber Security Education Opportunities
Over 4,450 InfoSec Events! | Cybersecurity Conferences 2020 – 2021
The Top 50 Must-Attend Information Security Conferences in 2019 | Digital Guardian
The CSO guide to top security conferences, 2019 | CSO Online
3 tips to get the most out of Black Hat and Defcon | CSO Online
How to avoid getting burned at Black Hat, destroyed at DEF CON or blindsided by Bsides • The Register
DEF CON - Wikipedia
US Air Force to pose orbiting satellite challenge to hackers at DEFCON 2020 | E&T Magazine
Photos show the cultural difference between Black Hat and Defcon hacker events | VentureBeat
RSA cyber security Conference - Wikipedia
Where The World Talks Security | RSA Conference
Calisthenics Parks - Street Workout Spots Map - Home of the bars - physical training areas around the world - travel - pullups bars
The Ultimate Guide to Finding a Calisthenics Park | physical training, street workout spots
How Do You Wash Laundry While Traveling? • Expert Vagabond
Practical Guide to Doing Laundry While Traveling - All You Need to Know!
How to Do Laundry While Traveling | Tortuga Backpacks Blog
How to Travel the World for Next to Nothing | Bryce Conway | TEDxInverness - YouTube
Hidden city ticketing: The hack airlines don't want you to use | CNN Travel
Airline Booking Hacks: What Works, and What Might Get You in Trouble - traveler
Airline passenger details easy prey for hackers, say researchers | cyber security
Skiplagging: The travel trick that airlines hate - hidden city ticketing
8 Tools to Help You Travel Forever and Live Rent Free — appartment, housing
Apartments and rooms for rent | housing while travelling
The Professional Hobo's Travel Resources - The Professional Hobo
Instead Of Renting An Apartment, Sign A Lease That Lets You Live Around The World - housing while travelling
The Ultimate Guide to Finding Apartments Around the World - Goats On The Road - housing while travelling
Just like WhatsApp, chats on Telegram and Signal are also vulnerable to hackers
Linux's commands and tricks I'm using in my daily job as a developer - definitive tips - netstat, ssh port forwarding, logs, vim sudo edit
NanoPi R1S Dual Gigabit Ethernet Router Comes with 32-bit or 64-bit Arm Processor
7+ Great Raspberry Pi Projects You Can Make Today - smart mirror, robot, quadcopter, gardener
How We Find Apartments Around the World - housing while travelling
Travel Resources - Never Ending Voyage
RoundTheWorldFlights.com | Blogs - Essential Visas
How to Spot Fake Businesses & Find the Signature of CEOs with OSINT « Null Byte :: WonderHowTo
New WhatsApp Bug Could Have Let Hackers Secretly Install Spyware On Your Devices - exploit, vulnerability
TPM-Fail Attacks Against Cryptographic Coprocessors - Schneier on Security - TPM-fail attack, timing, lattice,academic papers, cryptography, hardware, keys, TPM
The Evidence That Links Russia’s Most Brazen Hacking Efforts | WIRED - cyberwarfare
How to port an awk script to Python | Opensource.com
GitHub launches 'Security Lab' to help secure open source ecosystem | ZDNet
Windows & Linux get options to disable Intel TSX to prevent Zombieload v2 attacks | ZDNet
Gaping 'hole' in Qualcomm’s Secure World mobile vault leaked sensitive data | Secure World is part of Qualcomm's hardware-backed Trusted Execution Environment (TEE), based on ARM TrustZone, involving security extensions on ARM architecture including a secure virtual processor. 
Iranian hacking group built its own VPN network | APT33, shamoon malware, cyber warfare
Intel Failed to Fix a Hackable Chip Flaw Despite a Year of Warnings | ZombieLoad or RIDL, an acronym for Rogue In-Flight Data Load; Intel refers to it instead as as microarchitectural data sampling, or MDS. Like the Spectre and Meltdown vulnerabilities
Labour Party confirms cyber attack was DDoS | cyber warfare
Is Facebook Secretly Accessing Your iPhone's Camera? Some Users Claimed - industrial privacy violations
Are you fooled by this Johnson-Corbyn video? deepfake, definitive example, cyber warfare
Payment security backslides for second straight year, says Verizon | Compliance with PCI DSS continues to slide and that means more organizations are left open for data breaches, according to Veirzon's Payment Security Report.
Support for C++20’s Concepts in CLion | CLion Blog
Bjarne Stroustrup: C++ | Artificial Intelligence (AI) Podcast - YouTube
GitHub - emsec/hal: HAL – The Hardware Analyzer - comprehensive reverse engineering and manipulation framework for gate-level netlists focusing on efficiency, extendability and portability. HAL comes with a fully-fledged plugin system, allowing to introduce arbitrary functionalities to the core.
course Introduction to Hardware Reverse Engineering - Ruhr-Universität Bochum - cyber security, academic course
Fooling Voice Assistants with Lasers - Schneier on Security - Siri, Alexa, and Google Assistant are vulnerable to attacks that use lasers to inject inaudible­ -- and sometimes invisible­ -- commands into the devices and surreptitiously cause them to unlock doors, visit websites, and locate, unlock, and start vehicles, researchers report in a research paper published on Monday. Dubbed Light Commands, the attack works against Facebook Portal and a variety of phones - apple
BlueKeep exploit to get a fix for its BSOD Blue Screen of Death problem | Microsoft's Meltdown patch was causing BlueKeep attacks to crash on some systems.
A guide to intermediate awk scripting | Opensource.com
GitHub - jovanbulck/sgx-step: A practical attack framework for precise enclave execution control - SGX-Step is an open-source framework to facilitate side-channel attack research on Intel SGX platforms. SGX-Step consists of an adversarial Linux kernel driver and user space library that allow to configure untrusted page table entries and/or x86 APIC timer interrupts completely from user space. Our research results have demonstrated several new and improved enclaved execution attacks that gather side-channel observations at a maximal temporal resolution (i.e., by interrupting the victim enclave after every single instruction). Abstract Trusted execution environments such as Intel SGX hold the promise of protecting sensitive computations from a potentially compromised operating system.
What Keeps NSA Cybersecurity Boss Anne Neuberger Up at Night | cyber warfare
xHelper Malware for Android -  advanced persistent threats, Android, hacking, malware, operating systems, Symantec
DNS-over-HTTPS will eventually roll out in all major browsers, despite ISP opposition | ZDNet
Eavesdropping on SMS Messages inside Telco Networks - Schneier on Security - IMSI, APT41 (a Chinese APT group)
International mobile subscriber identity - IMSI
Twitter Insiders Allegedly Spied for Saudi Arabia | cyber warfare, privacy, state surveillance
Google Is Helping Design an Open Source, Ultra-Secure Chip | opentitan, secure enclave
Experts: Don't reboot your computer after you've been infected with ransomware | Rebooting may lead to restarting a crashed file-encryption process, potential loss of encryption keys stored in-memory.
Anti-Deepfake Law in California Is Far Too Feeble | cyber warfare
Google’s OpenTitan: A new open source silicon root of trust project debuts | PKI, cryptoprocessor
Android bug lets hackers plant malware via NFC beaming | CVE-2019-2114 bug
WhatsApp Hack Targeted Officials in More Than 20 Countries | privacy, state surveillance
The First Microsoft BlueKeep Vulnerability Mass Hacking Is Finally Here—but Don't Panic | WIRED
GitHub - fail2ban/fail2ban: Daemon to ban hosts that cause multiple authentication errors - brute force password cracking mitigation
GitHub - initstring/uptux: Linux privilege escalation checks (systemd, dbus, socket fun, etc)
GitHub - justmao945/mallory: HTTP/HTTPS proxy over SSH -
An inside look at WP-VCD, today's largest WordPress hacking operation |
The Story of Sandworm, the Kremlin's Most Dangerous Hackers | cyber warfare
Obfuscation as a Privacy Tool - Schneier on Security - privacy, state surveillance, tor browser, browser privacy plugins addons extensions
Can the Pentagon's new draft rules actually keep killer robots under control? The Department of Defense has just unveiled its draft guidelines on the ethical use of AI in warfare -
System76 introduces laptops with open source UEFI/BIOS/firmware coreboot | privacy respectuous alternatives
Your WordPress site is at risk: These precautions and plugins can keep it secure | security, mitigation
The Journey to Try Harder: TJnull’s Preparation Guide for PWK/OSCP | training - NetSec Focus
GitHub - Kodi-vStream/venom-xbmc-addons: Addon de Streaming français pour Xbmc
Raspberry Pi DNS Settings: How to Change the DNS - /etc/dhcpd.conf, resolv.conf, resolvconf
Advanced Windows Exploitation Course AWE and the OSEE Exploitation Expert Certification | Offensive Security
The search for animal 0-day: Reviews for OSCP, OSCE, OSEE and Corelan Advanced Training
My AWE Experience - OSEE Review – Welcome Hackers!!!
Offensive Security Exploitation Expert OSEE - Advanced Windows Exploitation class and its exam
If OSCP is entry level, then which cert is "guru" level? oscp, osce, osee, oswe, red team cert active directory - definitve comparison based on difficulty
Offensive Security Wireless Attacks course WiFu and the OSWP Wireless Professional Certification | Offensive Security
OSCP/OSCE/OSWP Review · ./own.sh - security ethical hacking pentesting certifications comparison
My experience with OSWP/WiFu v3.2 – 0xDarkVortex
Certification: OSWP - Mike Bond - Medium
OSWP: The entry-level cert - m4iler's mind
All your base belong to /dev/null
0x0 Course Review: WiFu – OSWP and Finding Evil – GCFA
Become a Cybersecurity Expert: Top Cybersecurity Certifications for 2019 -security ethical hacking pentesting certifications comparison
Interesting article - It’s Time to Move on from Offensive Security Certifications — security ethical hacking pentesting certifications comparison
Course Review: Offensive Security AWE (Advanced Windows Exploitation) - osee
My Experience of OSCP Proctored Exam - Kyaw Thiha - Medium
Remote Network Driver Interface Specification (RNDIS) is a Microsoft proprietary protocol used mostly on top of USB. It provides a virtual Ethernet link to most versions of the Windows, Linux, and FreeBSD operating systems. A partial RNDIS specification is available from Microsoft, but Windows implementations have been observed to issue requests not included in that specification, and to have undocumented constraints
Android USB Tethering - Gentoo Wiki
Is there a viable alternative to MTP for file transfer? ADB
The NSA Warns of TLS Inspection - certificates, cryptanalysis, encryption, man-in-the-middle attacks, NSA, TLS, traffic analysis
New bypass disclosed in Microsoft PatchGuard (KPP) | After GhostHook and InfinityHook, we now have ByePg. No patch out yet.
Bash cheat sheet: Key combos and special syntax | Opensource.com
Russian Hacker Behind NeverQuest Banking Malware Gets 4 Years in U.S. Prison
How C++17 Benefits from Boost Libraries, Part One - Fluent C++
C++20 and ReSharper C++ - ReSharper C++ BlogReSharper C++ Blog
GPS Manipulation - China, GPS, theft, transportation
Anonymous hacker gets a whopping six years in prison for some lame DDoS attacks - hacker pinched, caught - anonymity throughout attack
What Happens When You Remove a Police-Installed GPS Tracker  | WIRED
Iran Has Shut Off its Internet - censorship, control, Internet and society, Iran
Iran’s APT33 Hackers Are Targeting Industrial Control Systems | WIRED
Official Monero website compromised with malware that steals funds | Official Linux CLI binary for the Monero cryptocurrency compromised with malware that steals users' funds.
DuckDuckGo Will Automatically Encrypt More Sites You Visit | https encryption, https everywhere
Top 10 Vim plugins for programming in multiple languages | Opensource.com
Ransomware hits Louisiana state government systems | cyber warfare
Windows security warning: Ransomware is growing fastest, and just got harder to tackle | Crypto-locking malware attacks are growing, and could become more dangerous after the apparent departure of a big player.
Security Vulnerabilities in Android Firmware - Android, firmware, smartphones, supply chain, vulnerabilities
Google patches ‘awesome’ XSS vulnerability in Gmail dynamic email feature | The bug bounty hunter who disclosed the issue says the bug is a prime example of DOM Clobbering.
Burglars Really Do Use Bluetooth Scanners to Find Laptops and Phones | The bug bounty hunter who disclosed the issue says the bug is a prime example of DOM Clobbering.
Attackers using WhatsApp MP4 video files vulnerability can remotely execute code | The buffer overflow flow bug has been disclosed by Facebook.
GitHub - clong/DetectionLab: Vagrant & Packer scripts to build a lab environment complete with security tooling and logging best practices - hacking lab
Cheat sheet for Linux users and permissions | Opensource.com
How to use regular expressions in awk | Use regex to search code using dynamic and complex pattern definitions.
How Iran's Government Shut Off the Internet | government surveillance, state, privacy, cyber warfare
How to Lock Down Your Health and Fitness Data | fitbit, Apple health - privacy
GitHub - thewhiteh4t/seeker: Accurately Locate Smartphones using Social Engineering -geolocation longitude latitude accuracy altitude
Extensive hacking operation discovered in Kazakhstan | cyber warfare
How to Run USB Rubber Ducky Scripts on a Super Inexpensive Digispark Board - hacking with arduino
How to Find Passwords in Exposed Log Files with Google Dorks « Null Byte :: WonderHowTo
How to Haunt a Computer with SSH « Null Byte :: WonderHowTo
Hacking Windows 10: How to Dump NTLM Hashes & Crack Windows Passwords - keystroke injection payload can be invoked with Mousejack vulnerabilities or a USB Rubber Ducky - mimikatz, procdump
How to Identify Web Application Firewalls with Wafw00f & Nmap « Null Byte :: WonderHowTo
PINEPHONE – “BraveHeart” Limited Edition Linux SmartPhone for early adopters – PINE Store - open source smartphone, privacy respectuous alternative
Beautiful, Secure, Privacy-Respecting Laptops & Phones – Purism - privacy alternatives
Librem 5 – Purism - open source privacy respectuous smartphone alternative to Android, iOS
Librem 5 vs. PinePhone: comparison of two Linux smartphones - open source privacy respecting alternatives
Librem - line of computers manufactured by Purism, SPC featuring free (libre) software. The laptop line is designed to protect privacy and freedom by providing no non-free (proprietary) software in the operating system or kernel, avoiding the Intel Active Management Technology AMT, and gradually freeing and securing firmware. Librem laptops feature hardware kill switches for the microphone, webcam, Bluetooth and Wi-Fi - bios, coreboot - privacy respecting alternatives laptops, smartphones, bootloaders, firmwares
Purism (company) - pureos - privacy respecting alternatives
Halo Privacy partners with Purism – Purism
Purism Becomes PIA’s First OEM Partner – Purism - private internet access VPN - privacy concerns - see reddit
Purism and Private Internet Access partnership - Purism - privacy concerns -https://puri.sm/posts/purism-becomes-pia-first-oem-partner/
Kill switch - emergency stop (e-stop) and as an emergency power off (EPO), is a safety mechanism used to shut off machinery in an emergency, when it cannot be shut down in the usual manner - military, cyber warfare
Piratage du réseau d'une centrale nucléaire indienne : quelles leçons pouvons nous en tirer ? Quelques pistes de réflexion- nuclear plant facility hacking, cyber warfare
Comment avoir du succès quand on travaille en freelance ou à domicile : des ingénieurs logiciels partagent leurs expériences - it freelance advices, tips, software engineering
IPVM Video Surveillance Information - privacy violations, industrial government surveillance, facial recognition
Hikvision Markets Uyghur Ethnicity Analytics, Now Covers Up - cyber warfare
La police chinoise utilise une caméra basée sur l'IA et des analyses raciales pour suivre les Ouïghours et les distinguer de la majorité Han - hikvision facial recognition privacy violation uighurs people
coreboot Firmware on Purism Librem devices – Purism - privacy respecting alternatives
coreboot - Fast, secure and flexible OpenSource firmware - privacy respecting alternative
Librem 13 laptop review: physical security for the paranoid - The Verge
Purism Librem Laptops - Any feedback from *real* owners? - linux
Very unhappy with Purism and Librem laptop - Purism - review
New Attack Lets Android Apps Capture Loudspeaker Data Without Any Permission - Spearphone: A Speech Privacy Exploit via Accelerometer-Sensed Reverberations from Smartphone Loudspeakers
Don't use PureOS or the Librem 5 - privacy - security concerns - definitive criticism comments
DuckDuckGo Will Automatically Encrypt More Sites You Visit - privacy respecting alternative browsers
Mozilla Foundation - How smart homes could be wiser - privacy, security, IoT
Mozilla wants to rethink the next gen of smart home - with privacy ‘at the core of its design.’ - privacy, security, IoT
My Electrical Outlet Sparks When I Plug Something In - étincelle prise électrique
Travelling to the United States: getting an ESTA - electronic system travel authorization
WebVR Part 3: WebAssembly and AssemblyScript Examples | Toptal
How to Root your Samsung with Odin Download? - Sally Smith - Medium
Odin (firmware flashing software) - vs Heimdall - android smartphone rooting
Install LineageOS on odin | unlock bootloader - android rooting
Kingo Root - aka One Tap Root or KingoRoot includes a series of system debugging/root obtaining software for Android devices, including Kingo Android Root, Kingo APK Root and Kingo SuperUser. It helps Android users to root their devices
GitHub - hunters-forge/mordor: Re-play Adversarial Techniques - The Mordor project provides pre-recorded security events generated by simulated adversarial techniques in the form of JavaScript Object Notation (JSON) files for easy consumption. The pre-recorded data is categorized by platforms, adversary groups, tactics and techniques defined by the Mitre ATT&CK Framework. 
Manipulating Machine Learning Systems by Manipulating Training Data - Schneier on Security - fooling hacking artificial intelligence
A decade of hacking: The most notable cyber-security events of the 2010s | noteworthy malware attacks list since 2010
DHS Mandates Federal Agencies to Run Vulnerability Disclosure Policy - Schneier on Security
It’s Way Too Easy to Get a .gov Domain Name — Krebs on Security - spoofing
HPE tells users to patch SSDs to prevent failure after 32,768 hours of operation | HPE SAS SSD users need to install a critical firmware patch or they'll lose their SSDs, including their data.
In just three months, Google sent 12k warnings about government-backed attacks | state sponsored malware attacks, cyber warfare, government surveillance, Advanced Protection Program (APP) -
Even Privacy-Focused Cryptocurrency Can Spill Your Secrets | Monero, zcash, attacks vulnerabilities
How to use loops in awk | Opensource.com
DEFINITIVE - About Internet Anonymity, Our Life and Its Relativity - privacy, tor, VPN, proxy, fde full disk encryption, veracrypt, virtual machines vm
How to Write a Resume for a Cybersecurity Position
Hackers now use web skimmers to steal credit card data - Banking security , breach, Phishing, Privacy, security, Skimmer, Skimming
Dozens of Severe Flaws Found in 4 Popular Open Source VNC Software - security
How to Install and Use dig and nslookup Commands in Linux
The Debate Over How to Encrypt the Internet of Things | lightweight encryption - IoT security
GitHub - vonahisec/leprechaun: This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets. - post-exploitation privilege-escalation - malware tool
GitHub - pahaz/sshtunnel: SSH tunnels to remote server.
What happens when you type ls -l in a (Linux) shell - internals, how shell works internally, definitive breakdown, system calls
Disassembling C++ — Part 1 (Overloads) - reverse engineering
Linking Dynamic Programming (DP) challenges in LeetCode - solutions
CppUnit - Wikipedia
virtual machine - Lightweight isolated linux environment - chroot, virtual machine, lxc, vserver, openvz
ubuntu - Why use lxc instead of chroot? virtual box, vmware, kvm
Containers vs. virtual machines: A simplified answer to a complex question - VMs
OS-level virtualization - Implementations - containers solaris, docker - zones solaris, virtual private servers VPS OpenVZ, Virtual Environment EVs, virtual kernel (DragonFly BSD), or jails (FreeBSD jail or chroot jail)
Virtual machine - system/process virtual machine
Full virtualization - Wikipedia
Emulator - Wikipedia
Hardware-assisted virtualization - Wikipedia
Comparison of platform virtualization software - Wikipedia
Application virtualization - Wikipedia
embedded system - What exactly is a chroot? Is it similar to a simultaneous dual boot? - Ask Ubuntu
Containers vs. Zones vs. Jails vs. VMs | Hacker News
Equery - Gentoo Wiki - portage package management
terminology - Why define CIA in security like this? confidentiality, intregrity and availability.
How to do dependency injection in C? - Stack Overflow
Collapse split windows - Emacs Stack Exchange
C Macro Tips and Tricks | preprocessor
C Programming Tips and Tricks Every Programmer Should Know - macros - swap variables without temporary variable - array vs pointers - RNG srand time null - #if 0
DEFINITIVE - The Best GCC Tips and Tricks You Must Know - __attribute__ - weak function - hook - automatic type inference _auto_type typeof, C auto - wrapper function - __real_malloc - switch case ranges - array designated-initializer, range based initialization - cast to union - C11 unnamed structure fields - constructor/destructor function attribute - compound litteral - nested function - zero length array - VLAs - offsetof - transparent union - stringizing - concatenation - repeat macros - poor man templating, templates - compile time assertions -
Nested function - Wikipedia
Nested function in C - gcc extension
c - Initializing "a pointer to an array of integers" - compound literal
Introduction · A Guide to Porting C and C++ code to Rust - macros - comparison
Why Rust for safe systems programming - secure coding
How many security exploits would Rust prevent? vs C - memory corruptions
How Rust’s standard library was vulnerable for years and nobody noticed - security
GitHub - ANSSI-FR/rust-guide: Recommendations for secure applications development with Rust - secure coding - BCP
Rust steals C's crown with Microsoft secure code project | coding - project verona
Tips for embedded C developers - macros
Introduction - The Embedded Rust Book - bare metal
Introduction - The Rust Programming Language - security
c++ - Is it good practice to rely on headers being included transitively? multiple headers inclusion
posix - Function overloading in C - open system call - variadic function, varargs, stdargs
Function overloading - Wikipedia
solid - Is overloading an example of the Open/closed principle? - SOLID
How to achieve function overloading in C? macros
java - Why is the return type of method not included in the method-signature? definitive
c - Not checking close()'s return value: how serious, really? system call, file descriptor, silent loss of data - kernel panic - NFS server
Implementation of the open system call · Linux Inside
Implementation of the open system call · Linux Inside - internally
How to Use Linux Hexdump Command with Practical Examples
shell script - Fetching individual bytes from a binary file into a variable with bash - xxd, od, dd linux command - definitive use cases
break statement in C - Causes the enclosing for, while or do-while loop or switch statement to terminate.
c - How to break out of nested loops? - Stack Overflow
System resource - DMA channels
Sink (computing) - event sink or data sink is a class or function designed to receive incoming events from another object or function - callbacks, delegates
hexdump command in Linux with examples - GeeksforGeeks
Boolean type support library in C - stdbool
In C programming, what is the difference between bool and _Bool? - Quora
What is the difference between open() and fopen() in C? How are they different with each other in terms of internal working? - Quora
Security guideline for source code hosting and sharing
What makes Ada the language of choice for the ISS's safety-critical systems? secure coding - vs C/C++ - undefined behaviors - embedded/real time systems - vs C/C++
C/C++ Create an enum with negative values, without having to number it - Stack Overflow
Task #39699: implemntation of hal_mmc - Lot 3 - WYPLAY CANAL PROJECTS REDMINE
Understanding Integer Overflow in C/C++ - undefined behavior - secure coding
Fun with NULL pointers, part 1 - kernel exploit - dereferencing
algorithms - How does integer comparison work internally? assembly level - definitive
Parallel random-access machine - Wikipedia
Parallel programming model - Wikipedia
Concurrency (computer science) - Wikipedia
eTemptation WyPLAY - - 5.0.0.37 - Badgeages
Moving around | Vim Tips Wiki | Fandom
DEFINITIVE - What is a threat model, and how do I make one? - Information Security Stack Exchange
c++ - Why is there no underflow warning for unsigned type? - Stack Overflow
display - How can I get a ruler at column 80? - Emacs Stack Exchange
trap representation - definitive - union
Purpose of Unions in C and C++ - trap representation - type punning - memory reinterpretation - aliasing
casting - Implicit conversion during assignment in C? - definitive
c - How to use printf() in multiple threads - mutex - atomicity - va_start, va_list, variadic function
Write your own printf() function in c - implementation
microcontroller - Using volatile in embedded C development - Electrical Engineering Stack Exchange
atomic types in C - _Atomic
c++ - int a[] = {1,2,}; Weird comma allowed. Any particular reason? - Stack Overflow
Linux device driver development: The pin control subsystem - pin muxing
Input–output memory management unit - IOMMU - Direct Memory Access DMA -
Southbridge (computing) - The southbridge is one of the two chips in the core logic chipset on a personal computer (PC) motherboard, the other being the northbridge. The southbridge typically implements the slower capabilities of the motherboard in a northbridge/southbridge chipset computer architecture. In systems with Intel chipsets, the southbridge is named I/O Controller Hub (ICH), while AMD has named its southbridge Fusion Controller Hub (FCH) since the introduction of its Fusion AMD Accelerated Processing Unit (APU).
Northbridge (computing) - or host bridge is one of the two chips in the core logic chipset architecture on a PC motherboard, the other being the southbridge. Unlike the southbridge, northbridge is connected directly to the CPU via the front-side bus (FSB) and is thus responsible for tasks that require the highest performance. The northbridge, also known as Memory Controller Hub, is usually paired with a southbridge
DMA attack - type of side channel attack in computer security, in which an attacker can penetrate a computer or other device, by exploiting the presence of high-speed expansion ports that permit direct memory access - IOMMU, intel VT-d, AMD-Vi - OHCI 1394 specification, SBP2 spoofing - Inception, FinFireWire malwares - kernel device driver, kernel space/user space - signed drivers, signature - RAM/memory code injection
Physical security - Wikipedia
Physical access - keyloggers, bootloaders, grub
wifi - Is it considered bad practice to use company name as part of an SSID? - security through obscurity
Pin control attack - class of attack against a system on a chip (SoC) in an embedded system where attacker targets I/O configuration of the embedded systems and disables software or operating system I/O functions without detection. The attack is facilitated by a lack of hardware protection for pin configuration and pin multiplexing configurations - PLC programmable logic controller - industrial machines hacking
pcb - Is there a difference between PIO and GPIO pins? Programmable I/O, Parallel I/O, Peripheral I/O - Direct Memory Access DMA
qcsapi/qcsapi_driver.c at master · openwrt-es/qcsapi - Quantenna Communications
Comparison of open-source wireless drivers - Wikipedia
Device Tree - dtb, dts - blob, sources
Flattened Device Tree Python Module - fdt · PyPI
Preparing Device Tree Blob DTB - System On Chip < TWiki
An alternative device-tree source language - beaglebone black
DTS and DTB files
Device Tree - overlays
Manually editing Device Tree Sources (.dts) files | UDOO Forum
The Device Tree: Plug and play for Embedded Linux - haifux-devicetree.pdf
How to add DT support for a driver - device tree - embedded system, IoT
Linux Device tree
Porting FreeBSD to a new ARM Board Part 2 - DTS Device Tree Source, DTB blob
Device Tree - Wiki - Open Source Software and Platforms - Arm Community
ARM Architecture Basics – Linux Kernel For Newbies
cross compiling - How to compile dts Linux device tree source files to dtb? - Stack Overflow
How linux kernel get data from the Device tree? - Stack Overflow
How do I embed a device tree blob, (dtb), in a linux kernel? - Flattened Image Tree format (FIT). FIT uses DTS
How to add device tree blob to Linux x86 kernel boot? - DTB
Device Tree Overlays  |  Android Open Source Project
OpenWrt Project: Device Tree Usage in OpenWrt (DTS)
Device Tree (dtb) - postmarketOS
Device Tree Customization
Device Tree - linux-sunxi.org
Customize your Device Tree
Kernel-with-device-tree - U-Boot
Devicetree Specification - flattened
Solved: How do I modify dts file manually for my zynq-7000... - device tree
Reverse Engineering of Binary Device Drivers with RevNIC
A Tutorial on the Device Tree (Zynq) -- Part I | xillybus.com
7.5 Device Tree Blob (Flat Device Tree) | Bootloaders in Embedded Linux Systems | InformIT
Overlay (programming) - Wikipedia
Overlay filesystem - ArchWiki
Die (integrated circuit) - in the is a small block of semiconducting material on which a given functional circuit is fabricated
Introduction to Hardware Security - Embedded Systems Security, Security Models, Side Channels Attacks SCA, Fault Attacks/Injections FA, Invasive Attacks, cryptanalysis
FlattenedDeviceTree - FreeBSD Wiki
GitHub - s0be/dtimgextract: Tool to decompile a qualcomm dt.img into its split dtb files for the supported boards - device tree blob
Extract vendor files from device or system.img - Using / e / / Build /e/ - /e/ community
HOWTO Create a Device Tree | Documentation | RocketBoards.org
Extract vendor files from device or system.img - Using / e / / Build /e/ - /e/ community
Platform devices and device trees [LWN.net]
The platform device API [LWN.net]
Device Tree Hacking - OLPC
Hacking through device tree, uboot, and linux kernel setup for Cubox i4-Pro | My Technical Blog
Potato board hacking - device tree
Device trees I: Are we having fun yet? [LWN.net]
GitHub - PabloCastellano/extract-dtb: Extract device tree blobs (dtb) from kernel images
Booting the Linux/ppc kernel without Open Firmware - device tree block -
c - How to modify kernel DTB file - Stack Overflow
terminology - What is meant by the terms CPU, Core, Die and Package? - Super User
On-chip ROM Code Used in SOC Designs | EE Times
ROM Code First
secure boot - Arria 10 SoC Boot User Guide - first stage boot rom code, second stage boot loade u-boot - boot devices quad spi, sd/mmc, nand flash, fpga - bsp
Primary Storage vs Secondary Storage: What's the Difference? | Primary Storage and Secondary Storage Solutions | StorageCraft
Difference between Primary and Secondary Memory
linux - Is it possible to get the information for a device tree using /sys of a running kernel? - Unix & Linux Stack Exchange
Advanced Configuration and Power Interface - ACPI
AC power - alternate current
systemd: myservice.service vs myservice.target - unit configuration files
What is systemd's target, service and socket? - unit configuration files
Understanding Systemd Units and Unit Files | unit configuration files - service, target,
CentOS / RHEL 7 : Beginners guide to systemd targets (replacement of SysV init run levels) – unit configuration files - service, target
uintptr_t - equivalent/synonyme/similar to size_t
read() — Read from a file or socket - system call POSIX - sockets, streams
fopen, fopen_s in C - secure coding - C11
Is there an alternative for sleep() in C? select() vs loop - cpu performance - embedded systems
c - Using a for-loop or sleeping to wait for short intervals of time - slepp(), cpu resource consuming - performance
c - Why use select() instead of sleep()? - portability - usleep
poll vs select vs event-based - portability, performance
The C10K problem
History of computing hardware - Wikipedia
Moore's law - Wikipedia
Optical computing - Wikipedia
Are XSS attacks possible on Closed Websites? stored / reflected XSS
Separation of mechanism and policy - micro kernel vs monolithic kernel
GitHub - trehn/termdown: Countdown timer and stopwatch in your terminal
Bash Builtins (Bash Reference Manual)
lib/hal_mmc/hal_mmc.c · WIP-39612-HAL_MMC · randland / oem_hal_lib · GitLab
Is it bad to use special characters in passwords? - password strength
How to use timer in C?
performance - Best timing method in C? - gettimeofday
Codef00 - edb debugger author website - ROP return oriented programming
vkernel - Wikipedia
How to implement a countdown timer in the program? : C_Programming
Stack-oriented programming - calling conventions
Skeleton (computer programming) - top down design approach
Undo working copy modifications of one file in Git? git checkout -- file
Trivial File Transfer Protocol - tftp - network booting strategy like BOOTP, PXE, BSDP, etc., when targeting from highly resourced computers to very low resourced Single-board computers (SBC) and System on a Chip (SoC). It is also used to transfer firmware images and configuration files to network appliances like routers, firewalls, IP phones, etc. Today, TFTP is virtually unused for Internet transfers.
Hierarchical Data Format - hdf
Arc Injection = Return to Libc ret2libc Attack | Secure Coding in C and C++: Strings - seacord - secure coding C C++
penetration test - Difference between Code Injection, Command Injection and Remote Code Execution - RCE
Seacord - Strings Vulnerabilities - Common errors using NTBS - String Vulnerabilities - Mitigation Strategies - secure coding c c++
Secure and Practical Defense Against Code-injection Attacks using Software Dynamic Translation - arc injection, ret2libc - secure coding
Confused about Stack and Heap? architecture x86-64 - variable length arrays VLAs
Programming Without A Call Stack - Event-Driven Architectures
CERT Vulnerability Notes Database
types - What is timer_t at its base? - Stack Overflow
Lesson 8: Timers – Simply Embedded - callbacks - LED
Counting time with timer in C -
c++ - What is late binding? - dynamic dispatch - Compile-time binding - Load-time binding - VMT binding - Dispatch binding - Reflection
c++ - Why cast to a pointer then dereference? undefined behavior - strict aliasing rule - endianness - definitive example
Cyclone (programming language) - secure programming - buffer overflows - dangling pointers
Microsoft: We're creating a new Rust-like programming language for secure coding | verona project
GitHub - microsoft/verona: Research programming language for concurrent ownership - rust base, secure coding
List of HTTP status codes - Wikipedia
Tips for assessing the safety of an extension | Mozilla Support - add ons security, hacking - permissions
Recommended Extensions program | Firefox Help - add ons security - privacy
OSCP vs LPT (Master) vs CS Ranger - Alpcan Onaran - Medium
10 Tips For Certified Ethical Hacker (CEH) Exam Success
CEH Exam Preparation Tips - How to Clear it in the First Attempt
7 Tips on How to Pass the CEH Certification – Nasrumminallah Zeeshan
Tips and Tricks on How to Pass CEH
CEH v10 - Post Exam Study Write Up | DevQA.io
The Ultimate Study Guide for the EC-Council Certified Ethical Hacker (CEH) Exam
TCP/IP stack fingerprinting - passive, TTL - Layer 4
TCP Flow Control - sliding window
How to Enumerate NetBIOS Shares with NBTScan & Nmap Scripting Engine « Enumeration
NetBIOS - Wikipedia
Scanning NetBIOS | Penetration Testing Lab
SNMP enumeration with snmpenum and snmpwalk Carnal0wnage - Attack Research Blog Carnal0wnage & Attack Research Blog
What is SNMP Enumeration? - Infosavvy
IP Spoofing Detection Techniques | Direct TTL Probes, IP Identification Number, TCP Flow Control Method
What is NTP enumeration and its Properties - Zerosuniverse
Understanding and Exploiting Network Time Protocol - enumeration, nmap
Network Time Protocol Enumeration - tools ntpdare, ntptrace, ntpdc, ntpq
Enumerating NTP Servers - ntpq, ntptrace
SMTP User Enumeration | Penetration Testing Lab
Substitution Techniques and its types | Cryptography
Substitution cipher - cryptography technique
Difference between Substitution Cipher Technique and Transposition Cipher Technique - GeeksforGeeks
Analysis of Steganography Substitution System Methods Using New Testing Techniques Proposed for Strict Avalanche Criterion
DEFINITIVE - Principles of Steganography - Injection (Insertion), Substitution, and Generation Classifications - Embedding Data in a JPEG Image - Shortcomings of Steganography - Revealing the Existence of Hidden Data - Rendering Hidden Data Useless - Invisible Watermarks - Defeating Digital Watermarking, workarounds, defenses - Steganalysis - Dictionary Attacks - Statistical Analysis of JPEG Images
Practical Linguistic Steganography using Contextual Synonym Substitution and a Novel Vertex Coding Method
A Spatial Domain Image Steganography Technique Based on Plane Bit Substitution Method -
Transform Domain Techniques for Image Steganography
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
DEFINITIVE - A Survey on different techniques of steganographyA Survey on different techniques of steganography - definitive - image/text/audio/network - Spatial Domain Methods, Transform Domain Steganography, spread spectrum, statistical/distortion technique - masking and filtering -
Steganography: Various Techniques In Spatial and Transform Domain
Transform Domain Technique in Image Steganography for Hiding Secret Information -
International Journal of Soft Computing and Engineering -
Spread spectrum - Wikipedia
A ROBUST COVER GENERATION TECHNIQUE FOR STEGANOGRAPHY USING 2D IMAGES
Lawful interception - wiretapping, privacy, mass surveillance, data retention - cyber warfare - LEAs Law Enforcement Agencies
A Quick Guide to Sniffing Attacks | NIC promiscuous mode
Passive sniffing in 802.11 networks - wireless
Sniffing attack - Wikipedia
DEFINITIVE - 802.11: Wi-Fi standards and speeds explained | breakdown, list
Omnidirectional antenna - Wikipedia
Parabolic antenna - grid
Understand Yagi Antenna Theory: the Basics » Electronics Notes
Dipole antenna - doublet
Temporal Key Integrity Protocol - TKIP - packet spoofing
(Rivest cipher 6) is a symmetric key block cipher derived from RC5 - AES, RSA - block size, key sizeRC6 - NSA implant, mass surveillance, privacy
passwords - What are the differences between dictionary attack and brute force attack? - Information Security Stack Exchange
Brute Force Password Cracking - syllables
rule_based_attack [hashcat wiki] - password cracking
A Practical Guide to Cracking Password Hashes - hashcat tool - definitive intro
Password cracking and auditing - rule based
Types of Viruses - File/Parasitic Virus, Boot sector/Memory Virus, Macro Virus, Source code Virus, Polymorphic Virus (virus signature), Encrypted Virus, Stealth Virus, Tunneling Virus, Multipartite Virus, Armored Virus
What are stealth, polymorphic, and armored viruses?
Ping-Pong virus - aka Boot, Bouncing Ball, Bouncing Dot, Italian, Italian-A or VeraCruz - a boot sector virus
What is a Cluster Virus? - Definition from Techopedia
Macro virus - Wikipedia
What are boot sector viruses, and how can I prevent them?
What is boot sector virus? - bootstrap loader
Boot Sector Virus: How to Identify and Remove - definitive
Distributed Network Attack - DNA, password protected files recovering
What are words in a HASH algorithms - word/block size
Ransomware - encryption malware/virus
Wired Equivalent Privacy - WAP - wireless protocol - Initialization Vector IV Size
Bluesnarfing - bluetooth hacking attack
Bluetooth Hacking - Getting Started | hackers-arise
Bluejacking - bluetooth hacking
BlueSniff – Bluejacking Tools - bluetooth wardriving utility
IoT - Reverse engineering simple Bluetooth LE devices
Forwarding information base - FIB - Content-addressable memory CAM - MAC addresses
In Unix, what is the finger command? users enumeration - vs whois
What Are Blind SQL Injections | Acunetix
Error Based Injection | NetSPI SQL Injection Wiki
Example of a Error-Based SQL Injection - definitive list of sqli types - in-band/out-of-band, union-based, inferential/blind, boolean-based, time-based -
How Slack Hires a Red Team (and You Can Too!) - Several People Are Coding
Session fixation - hacking attack
Open Redirects(Unvalidated Redirects and Forwards) - attacks
What is cookie poisoning? - Definition from WhatIs.com
Session poisoning - Wikipedia
Session hijacking - Wikipedia
Boot Sector Virus - YouTube
14.113 Hard Disks, Sectors, Zone Bit Recording, Sectors vs Blocks, CHS, LBA, Sparing - YouTube
Data cluster - Wikipedia
File system fragmentation - 3 Types 3.1 File fragmentation 3.2 Free space fragmentation 3.3 File scattering 4 Negative consequences 5 Mitigation 5.1 Preventing fragmentation 5.2 Defragmentation
Interleaving (disk storage) - sectors
Track (disk drive) - Wikipedia
How can I move around in the Vim command line? - Stack Overflow
Memory Address - an overview | ScienceDirect Topics
How to run a program without an operating system? : programming
Practical Guide to Bare Metal C++ | Hacker News
how does malloc work in bare metal at DuckDuckGo
az 300 at DuckDuckGo
id as a service idaas cissp at DuckDuckGo
Identity as a Service and the CISSP
az 500 at DuckDuckGo
ms 500 at DuckDuckGo
az 301 at DuckDuckGo
command line - Environment variables when run with 'sudo' - Ask Ubuntu
Startpage.com Search results
A Guide to Digital Signature Algorithms - DZone Security
The Curious Flaw in DSA Digital Signatures – IndicThreads
St101.pdf
Knowlegde Through Fun: DRAWBACKS OF USING DIGITAL SIGNATURE
Digital Signature Algorithm - Wikipedia
Elliptic Curve Digital Signature Algorithm - Wikipedia
Private Browsing
Startpage.com Search results
linux - How to keep environment variables when using sudo - Stack Overflow
How do I make sudo preserve my environment variables? - Super User
Sudo - ArchWiki
su or sudo keeping/removing certain environment variables - Unix & Linux Stack Exchange
How do I set persistent environment variables for root? - Ask Ubuntu
Sudoers Manual
redhat - How to configure sudoers to always keep LD_LIBRARY_PATH envrionment variable? - Server Fault
Startpage.com Search results
root - How to override a PATH environment variable in sudo? - Server Fault
command line - Environment variables when run with 'sudo' - Ask Ubuntu
Dangerous Sudoers Entries – PART 2: Insecure Functionality – Compass Security Blog
How do I make sudo preserve my environment variables? - Super User
How I got root with Sudo | Securus Global Blog
security - Are environment variables visible to unprivileged users on Linux? - Unix & Linux Stack Exchange
secure path environment variable -Startpage.com Search results
secure path in sudoers -Startpage.com Search results
sudo - Which could be the risks to add "Defaults secure_path="/home/username" in "/etc/sudoers" - Ask Ubuntu
security - Why is PATH reset in a sudo command? - Unix & Linux Stack Exchange
linux - How to set path for sudo commands - Super User
10 Useful Sudoers Configurations for Setting 'sudo' in Linux
linux - How to programatically add secure_path in sudoers file - Server Fault
Sudo's secure path option can be circumvented
environment variables - Why does sudo change the PATH? - Stack Overflow
How To Edit the Sudoers File on Ubuntu and CentOS | DigitalOcean
1. Injection Attacks - Securing Node Applications [Book]
Direct Dynamic Code Evaluation ('Eval Injection') - OWASP
Eval() Vulnerability & Exploitation
exploit - Is PHP's eval() function vulnerable to code injection when executing a string built from an array? - Information Security Stack Exchange
What is Code Injection | Acunetix
eval - Wikipedia
Vipul Chaskar's Blog: Exploiting eval() function in Python
commix_plain.pdf
What is OS command injection, and how to prevent it?
1. Injection Attacks - Securing Node Applications [Book]
Code Injection and Mitigation with Example - GeeksforGeeks
Remote Code Evaluation (Execution) Vulnerability | Netsparker
What is Code Injection and How to Avoid It | Netsparker
CheatSheetSeries/Injection_Prevention_Cheat_Sheet.md at master · OWASP/CheatSheetSeries · GitHub
Anatomy of an attack: Gaining Reverse Shell from SQL injection
linux command line - How do I make my pc speaker beep - terminal
Awesome-Study-Resources-for-Kernel-Hacking/README.md at master · yeyintminthuhtut/Awesome-Study-Resources-for-Kernel-Hacking - exploit, pink screen of death, exploitation
GitHub - hamjam/lkmpg-examples: Examples for linux kernel module programming book
GitHub - VictorRodriguez/linux_device_drivers_tutorial: Linux Device Drivers Tutorial
Directory service - LDAP
What's the difference between a normal user and a system user? - Unix & Linux Stack Exchange
linux - In what condition, should I create a system user instead of a normal user? - Server Fault
linux - What's the difference between "adduser" and "useradd"? - Super User
Add a new user account with admin access on Linux - nixCraft
My Learning Journey - Learning never stops, stay positive and keep learning. - bug hunting, vulnhub, hacking challenges
FuzzySecurity | Windows Privilege Escalation Fundamentals - information gathering, reconnaissance
Itanium - Wikipedia
linux - How to mount a VirtualBox shared folder? - vboxsf - guest additions
How to access a shared folder in VirtualBox? - auto mount, manager
10 Reasons to prefer Parrot-Sec over Kali Linux -p5yph3r
Open Virtualization Format - OVF
Virtual appliance - Open Virtual Appliance - OVA - OVF, DMTF
Grid computing - distributed system
DEFINITIVE - How to Buy the Right SSD: A Guide for 2020 | NVMe, PCIexpress, M.2, SATA- SLC, MLC, TLC, QLC
Best SSD for gaming 2020: Faster storage for your gaming PC | PC Gamer
How to Buy a Hard Drive | RAID, eSata
M.2 - Next Generation Form Factor (NGFF) - PCIe, SATA, NVMe, AHCI
What is M.2 SSD? PCIe, NVMe, mSATA, SATAe, WiFi, USB - definitive
Form factor (design) - Wikipedia
SSD Hardware Encryption versus Software Encryption - TPMFail
Understanding M.2, the interface that will speed up your next SSD | Ars Technica
How to Choose an External Hard Drive | SSD vs HDD - security
SSD vs. HDD | Digital Trends
Buying a New Hard Drive: 7 Things You Must Know - external vs internal, HDD vs SSD
What is Cryptographic Erasure (Crypto Erase)? - cryptoshredding
Radboud University researchers discover security flaws in widely used data storage devices - self-encrypting deception - drives encryptions weakness, hardware based
DEFINTIVE - privacy, anonymity, encryption tools resources, articles - David Balaban - HackRead
How To Keep Your Router And WiFi Safe From Hackers - hackers, hacking, Malware, Ransomware, Router, security, Vulnerbility, WIFI - definitive
Never Forget That You Are Being Watched - google, facebook - anonymity, privacy, surveillance
Smart TVs make screenshots every second & send them to the server - IoT, Privacy, security, Smart TV, Technology - definitive -
Why a VPN is Compulsory for Torrent Users - BitTorrent, IP Address, Piracy, security, Technology, Torrent, VPN - definitive - p2p, peer to peer
5 things you should never do when using anonymous operating systems - Anonymity, anonymous, Police, Privacy, security, VPN - definitive, surveillance
How to Torrent Safely and legally? BitTorrent, safe torrenting, torrenting, Torrents - privacy - definitive
Comments on XTS-AES -
The XTS-AES Validation System (XTSVS)
encryption - What is the advantage of XTS over CBC mode (with diffuser)? - Cryptography Stack Exchange
CIS 5930 Internet Security - A Hands-on Approach - academic course
3 encryption tools for Linux that will keep your data safe | filesystem vs full disk encryption, LUKS, dm-crypt, cryptsetup
Should WhatsApp let you disable URL previews? | TechCrunch
Hard Disk Drives - sectors, tracks, spindle, heads, cylinder
Making logic gates from transistors - YouTube
Mount (computing) - official FIPS-certified secure drive - mount point
DEFINITIVE - Disk encryption - ArchWiki - filesystem, block device/disk partition encryption - dm-crypt, veracrypt/truecrypt, AES, ecryptfs, encrypted swap, mlocate
BitLocker - Wikipedia
DEFINITIVE - boot - How to get out of EFI shell in virtual box - ESP EFI system partition - fs0: grubx64.efi
#14279 (Switch on permanent NVRAM to fix UEFI boot) – Oracle VM VirtualBox - fs0:\EFI\FuntooLinux\grubx64.efi - definitive
EFI system partition - ESP - bootloaders, kernel images
compiz - How to configure shortcuts for workspaces on MATE 1.6 - gsettings, hotkey, keybinding
What is the Mod4+D shortcut key? - xmodmap
50 Simple and Useful Linux Cut Command in Unix with Examples
permissions - How do I change my username? - Ask Ubuntu
Top 7 terminal emulators for Linux | Opensource.com
Thunderbolt (interface) - direct memory access (DMA) attack - Option ROM attacks
How to choose the right portable SSD - NVMe, PCIe, SATA - USB 3, Thunderbolt
DEFINITIVE - The Best External SSDs for 2020 | enclosure USB interfaces, pcie, nvme, sata - definitive - DIY SSDs - USB 2.0 vs USB 3 - USB 3.2 Gen 1, USB 3.2 Gen 2x1, Gen 1x2, USB 3.2 Gen 2x2 aka SuperSpeed USB 20Gbps - security, ruggedness - FIPS 2 validated
SecureDrive | FIPS Validated | Encrypted Hard Drives & USB Flash Drives - secure storage, hardware based full disk encryption - purchase
How Do Solid-State Drives Work? SSD - flash memory - HDD
Hard Drives, SSDs, Flash Drives: How Long Will Your Storage Media Last? lifespan
hard drive - External SSD vs. Internal standard HDD for speed? USB enclosure - Super User
How to achieve the best transfer speeds with external drives | External Storage Enclosure - SSDs, HDDs - definitive - PCIe, SATA
memcpy, memcpy_s in C - restrict - __STDC_LIB_EXT1__ - __STDC_WANT_LIB_EXT1__
undo - How to uncommit my last commit in Git - Stack Overflow
In plain English, what does "git reset" do? - definitive explanation, HEAD
Ask HN: Your favorite to-do list or task manager? | orgmode emacs
The Best To-Do App for Linux - wunderlist - definitive
Mytodo: A ToDo List Manager For DIY Lovers - It's FOSS
What is a network bridge? | OSI Layer 2 data link - MAC address - segments
WHAT IS BRIDGE IN NETWORKING| Features of Bridge in computer network with live example | 2017 - YouTube
Network bridge - ArchWiki
Use a Bridge to Expand Your Local Network
Use a Bridge to Expand Your Local Network
How to reinitialize an array in C (not C++)? - Stack Overflow
STR30-C. Do not attempt to modify string literals - SEI CERT C Coding Standard - secure coding - assignment to const pointer/array - strpbrk(), strchr(), strrchr(), strstr() wcspbrk(), wcschr(), wcsrchr(), wcsstr() memchr(), wmemchr() funtions
Anonymous function - function literal, lambda abstraction, or lambda expression
What is the type of string literals in C and C++? definitive
Quine (computing) - self replicating programs, self-reproducing programs, and self-copying programs
STR05-C. Use pointers to const when referring to string literals - SEI CERT C Coding Standard - Confluence - secure coding
c++11 - Why are pointers to literals not possible? - Software Engineering Stack Exchange
c++ - Initializing non-const parameter with string literal - Stack Overflow
authentication - Do fake wp-login pages help prevent webapp attacks? - authentication web-application
Vulners - Vulnerability Data Base - scanner - lucene search engine, google for hacker
Vulners Blog – Information security news, research, malware analysis - google for hacker, search engine, vulnerability scanner
SYN cookies - Wikipedia
C default arguments - Stack Overflow
Towards a Quieter Firefox - Black Hills Information Security - General InfoSec Tips & Tricks, InfoSec 201 Firefox, Firefox extentions, HTTP, penetreation testing, Pentesting, quieter Firefox, tool, webapp test
Prometheus (software) - monitoring tool
Build A Monitoring Dashboard by Prometheus + Grafana
Monitoring with Prometheus & Grafana — RabbitMQ
Why Trump vs. Warren in 2020 Would Prove America Is in Decline | geopolitics, history, imperialism
America Must Prepare for the Coming Chinese Empire | geopolitics, warfare, imperialism
spraykatz/README.md at master · aas-n/spraykatz - Spraykatz is a tool without any pretention able to retrieve credentials on Windows machines and large Active Directory environments. It simply tries to procdump machines and parse dumps remotely in order to avoid detections by antivirus softwares as much as possible - antivirus detection
C++ std::string_view for better performance: An example use case - nextptr
How to Hack UnrealIRCd Using Python Socket Programming « Null Byte :: WonderHowTo
How to Securely Sniff Wi-Fi Packets with Sniffglue « Null Byte :: WonderHowTo
How to Spy on Traffic from a Smartphone with Wireshark « Null Byte :: WonderHowTo
How to Watch TCP and UDP Ports in Real-time -sudo netstat -tulpn OR $ sudo ss -tulpn
Snapshot: Top 25 Most Dangerous Software Errors | Homeland Security - cwe
I Ditched Google for DuckDuckGo. Here's Why You Should Too | privacy focused alternatives - secure browsers comparison
5G hackers: These eight groups will try to break into the networks of tomorrow | security
This cheap gadget can stop your smartphone or tablet being hacked at an airport, hotel or cafe |
GDB Internals A guide to the internals of the GNU debugger
ConLangs: How to Construct a Language | Linguistics and Philosophy | MIT OpenCourseWare - definitive, cryptolinguistics
General Resolution: Init systems and systemd: First call for votes
There is no “Linux” Platform (Part 1) – definitive criticism, analysis, vs windows, Mac os x
World Wide Web Consortium (W3C) brings a new language to the Web as WebAssembly becomes a W3C Recommendation
Une importante fuite de données révèle des secrets des gens ultra-riches cachant leurs fortunes dans des paradis fiscaux, les documents sont en cours de divulgation sous le nom de "29 Leaks" - formations house - tax heavens
StrandHogg: Serious Android vulnerability leaves most apps vulnerable to attacks.
Usage and Attribution of Stack Overflow Code Snippets in GitHub Projects - vulnerabilities, flaws in shared code snippets
The most copied StackOverflow snippet of all time is flawed! | Programming.Guide
What size SSD is right for me? | PC Gamer
NIST Releases Data to Help Measure Accuracy of Biometric Identification | NIST
Mozilla to force all add-on devs to use 2FA to prevent supply-chain attacks | ZDNet
EFF on the Mechanics of Corporate Surveillance - business of security, EFF, privacy, surveillance, tracking
Why Ring Doorbells Perfectly Exemplify the IoT Security Crisis | WIRED
How to identify malware on your phone with these 7 signs - detection
"The Smartest Lock Ever” KeyWe is Vulnerable to Hacking - IoT
Process Hollowing - malware code mapping to legit suspended unmapped process- antivirus detection evasion
Understanding Process Hollowing | malware code mapping to legit suspended unmapped process- antivirus detection evasion
GitHub - m0n0ph1/Process-Hollowing: Great explanation of Process Hollowing (a Technique often used in Malware) -malware code mapping to legit suspended unmapped process- antivirus detection evasion
Process Hollowing - malware code mapping to legit suspended unmapped process- antivirus detection evasion
Process Hollowing - malware code mapping to legit suspended unmapped process- antivirus detection evasion
T1093: Process Hollowing and Portable Executable Relocations - malware code mapping to legit suspended unmapped process- antivirus detection evasion
Process Doppelgänging meets Process Hollowing in Osiris dropper - malware code mapping to legit suspended unmapped process- antivirus detection evasion
Attackers now use process hollowing to hide cryptocurrency miners on your PC | ZDNet
Scaring People into Supporting Backdoors - child pornography, crime, crypto wars, eavesdropping, encryption, fear, law enforcement, national security policy - state surveillance, privacy
How to replace a hard drive on Linux | HDD, ssd
Plundervolt: A new attack on Intel processors threatening SGX data
Microsoft details the most clever phishing techniques it saw in 2019 | This year's most clever phishing tricks include hijacking Google search results and abusing 404 error pages
TrickBot gang is now a malware supplier for North Korean hackers | North Korean state hackers spotted using Anchor, a new side-project developed by the infamous TrickBot malware gang - cyber warfare
Extracting Data from Smartphones -  data protection, hacking, privacy, smartphones, mobile - privacy, anonymity
Cybersecurity: How Facebook's red team is pushing boundaries to keep your data safe | ZDNet
Cryptocurrency-mining malware: Why it is such a menace and where it's going next | Cryptojacking
Toys “R” Us Is Back—Now With More Surveillance! | corporate industrial privacy violations
New PlunderVolt Attack Targets Intel SGX Enclaves by Tweaking CPU Voltage
10 things security teams should focus on, according to AWS' CISO | ZDNet
This Alleged Bitcoin Scam Looked a Lot Like a Pyramid Scheme | WIRED
Cameras that Automatically Detect Mobile Phone Use - state surveillance, privacy violation
Microsoft: We're creating a new Rust-like programming language for secure coding | Microsoft's Project Verona involves creating a new language for "safe infrastructure programming" to be open-sourced soon - definitve rust vs c c++ - memory safety, attacks
What we risk by opening up to customers | Opensource.com
Cheat sheet for Java syntax | Opensource.com
Avast and AVG Browser Extensions Spying On Chrome and Firefox Users - privacy violations
The Story of Tiversa - courts, cybersecurity, FBI, fraud, FTC -
Remember the viral app that aged you? FBI slams FaceApp as counterintelligence threat | cyber warfare, privacy, russia
GitHub - fatih4842/aSYNcrone: aSYNcrone is a SYN Flood DDoS Tool!
Failure Modes in Machine Learning - academic papers, machine learning, taxonomies, threat models - attacks artificial intelligence
How Panasonic is using internet honeypots to improve IoT device security | ZDNet
How to change colors and themes in Vim | Opensource.com
New privacy tool exposes which website leaves your data unprotected - privacy alert, chrome extension
New Linux vulnerability puts VPN connections at risk of hijacking - IP Address, security, Tor, VPN, Vulnerability - cve-2019-4899
GitHub - anti-bot/AntiDisposmail: Detecting Disposable Email Addresses - email-validation
BMW and Hyundai hacked by Vietnamese hackers, report claims | Hacks linked to Ocean Lotus (APT32), a group believed to operate with orders from the Vietnamese government.
Andy Ellis on Risk Assessment - psychology of security, risk assessment, risks -
DEFINITIVE - 5 things you should never do when using anonymous operating systems - tails, crosspost, speech pattern recognition
A beginner's guide to using Vagrant | Opensource.com
Get yourself a USB condom | juice jacking
Israeli firm buys Private Internet Access (PIA) VPN raising privacy concerns
GitHub - RUB-NDS/CORStest: A simple CORS misconfiguration scanner
Election Machine Insecurity Story - hacking voting machines
How to Setup an L2TP/IPsec VPN Client on Linux
Top gadgets for the security and privacy conscious (or the super paranoid!) | usb, RFID security
ZeroCleare: New Iranian Data Wiper Malware Targeting Energy Sector - shamoon, hacking groups—APT34, also known as ITG13 and Oilrig, and Hive0081, also known as xHunt.
The RCS Texting Protocol Is Way Too Easy to Hack | rich communication services
Two malicious Python libraries caught stealing SSH and GPG keys | malicious, sniffing
Hackers Can Mess With Voltages to Steal Intel Chips' Secrets | plundervolt, sgx, secure enclave
GitHub - x1mdev/ReconPi: ReconPi - A lightweight recon tool that performs extensive scanning with the latest tools.
How to Connect Your Android Phone to Your TV | usb c to HDMI adapter, converter
How to Connect Any Phone or Tablet to Your TV Using USB
How to Identify Missing Windows Patches for Easier Exploitation « Null Byte :: WonderHowTo
DEFINITIVE - How to connect and disconnect to a network manually in terminal? iwconfig - wireless, wifi
71 Smart Travel Money Tips (Save On Currency Exchange, Eliminate Bank Fees & More!) - currency exchange
Security and Privacy Issues in E-passports
Biometric passport - e passport
Hackers Clone E-Passports | WIRED
E-Passport Hacker Designs RFID Security Tool | WIRED
What’s Really Stored on the Microchip in Your e-Passport? biometric, security, RFID hacking
Hackers Clone RFID Passports - ACLU, cloning, hacking, ID cards, identification, passports, RFID
This Is How Easy It Is to Hack a Passport or a Credit Card - rfid
Are passport stamps a reliable security feature? - Information Security Stack Exchange
Overview security mechanisms in ePassports | Privacy – protect the privacy of the document holder by implementing access control and preventing eavesdropping Authenticity – ensure that the chip is not a forgery and that it is not manipulated Clone detection – detect if the chip is a copy   - RFID hacking
ePassport Basics - biometric - trust chain, certificate - definitive
How to Bargain Like a Pro in Istanbul's Grand Bazaar and Elsewhere - Istanbul Insider -
A complete guide to the Grand Bazaar: how to shop without getting lost | The Guide Istanbul
A Must-Have Guide to Shop in the Grand Bazaar travel notes and guides – Trip.com travel guides
GTFOBins - Shell Command Reverse shell Non-interactive reverse shell Bind shell Non-interactive bind shell File upload File download File write File read Library load SUID Sudo Capabilities Limited SUID
Plundervolt - Intel Software Guard Extensions (SGX) is a set of security-related instruction codes that are built into modern Intel CPUs. SGX allows to shield sensitive computations inside so-called "enclaves".
Thunderbolt - Escalation of Privilege, Information Disclosure
How to Program MicroPython NeoPixel Holiday Lights to Animate However You Want « Null Byte :: WonderHowTo
How to Get Started with MicroPython for ESP8266 Microcontrollers « Null Byte :: WonderHowTo
How to Find Hidden Web Directories with Dirsearch « Hacking Web Apps
Buy the Best Wireless Network Adapter for Wi-Fi Hacking in 2019 « Null Byte :: WonderHowTo
How to Phish Social Media Sites with SocialFish « Null Byte :: WonderHowTo
Istanbul to Izmir the alternative way
Train travel in Turkey | Timetables, fares, how to buy tickets - Turkey travel, bus, trains
Join the BDS movement and make an impact! | BDS Movement - israel boycott - coca cola, Starbuck, McDonald, hp
Catching a Ride on Bursa Public Transportation | The Best of Bursa - definitive, mudanya ferry, cable railway cab, teleferik
Turkey's Grand Plans for Middle East Primacy | The National Interest - geopolitics, warfare
En Ucuz Otobüs Bileti Fiyatları, Online Otobüs Bileti Al - obilet.com - Turkey intercities buses
Difference Between Adapter and Converter Difference Between | Difference Between - usb sata
Gunshot Wounds: 1. Bullets, Ballistics, and Mechanisms of Injury - warfare
Is China or Fear of China the Greater Threat?: Page 2 of 2 | The National Interest
Problem loading page
Is China Beating America to AI Supremacy? artificial intelligence, cyber warfare, privacy, government surveillance
Responses to Fukuyama | geopolitics, end of history - criticisms - definitive
It's Still Not the End of History - fukuyama
International Olympiad in Informatics - coding challenges
Why the World Should Fear a 'Thucydidean' China | The National Interest - geopolitics, warfare, navy
Does Congress Hate America? | The National Interest - geopolitics, anti imperialism, Doug bandow
James Jay Carafano | movies list, geopolitics, warfare,
Iran Power - definitive in depth analysis of iran military - geopolitics, warfare
The Iranian Missile Threat - definitive assessment of iran military, missile capabilities - geopolitics, warfare
Israel’s Next Northern War: Operational and Legal Challenges - definitive analysis Hezbollah, Iran military capabilities
The Shadow Commander | The New Yorker - definitive best profile of Qasim Suleimani
Python main function - JournalDev
Fact: Iran Is No Persian Empire (And Should Be Treated As Such) | geopolitics, warfare, British empire, maritime naval dominance
One of the World's Top Naval Experts Told Us All About a U.S.-Iran War | Napoleon, Spain, warfare, geopolitics, middle east, naval maritime
Iran's Coming Military Revolution | cyber warfare, artificial intelligence tools, UAV, geopolitics
A million people are jailed at China's gulags. I managed to escape. Here's what really goes on inside - Uighurs plight
George Orwell's Dystopian Nightmare in China - artificial intelligence, geopolitics
I researched Uighur society in China for 8 years and watched how technology opened new opportunities – then became a trap
The history of China's Muslims and what's behind their persecution - uighurs
The Roots of Hitler's Hate | history, geopolitics, conspiration
How Iran's Hackers Might Strike Back After Soleimani's Assassination | From data-destroying wipers to industrial control system hacking, Iran has a potent arsenal of cyberattacks at its disposal - cyber warfare, shamoon
Estimate of Hezbollah’s fatalities during the Syrian civil war and the conclusions arising from the analysis of their identity - analysis
Astrophysicist Says He Knows How to Build a Time Machine - time travel
Grand strategy - geopolitics, hegemony, superpower, imperialism, U.S Empire, warfare, primacy
What is grand strategy and why do we need it? geopolitics
Grand Strategy Isn’t Grand Enough – geopolitics
Killing of Soleimani follows long push from Pompeo for aggressive action against Iran, but airstrike brings serious risks - geopolitics
‘Top Secret America’: A look at the military’s Joint Special Operations Command - JSOC, cyber warfare, geopolitics
Esmail Qaani: the next Revolutionary Guards Quds Force commander? biography, geopolitics, warfare
What America needs to understand about Qasim Soleimani | definitive biography, profile - geopolitics, warfare
Suleimani’s Death Won't Stop Iran’s Plans - soleimani - geopolitics
Blast Wrecks Van of Skipper Who Downed Iran Jet - 1989 iran revenge for civilian airplane downing by U.S - geopolitics, warfare - history
Iran knows how to bide its time. Don’t expect immediate retaliation for Soleimani. - geopolitics, warfare
As the Assassination of Iran’s Suleimani Shows, the United States Is the Main Spoiler of Peace in the Middle East - geopolitics, iran
Moscow–Washington hotline - one time pad encryption
The History of One-Time Pads and the Origins of SIGABA - Schneier on Security
Be wary of one-time pads and other crypto unicorns
One-time-pad - definitve intro - Washington Moscow hotline
How Friendly Hackers Took Down America's F-15 Jet Fighter | The National Interest - cyber warfare, defcon
Trump and his Team are Lying Their Way to War With Iran
Iraq Body Count - casualties after 2003 irak invasion - geopolitics, warfare
Twenty-eight years ago Hezbollah’s leader was assassinated, and Israel paid a price - Atlantic Council - Abbas musawi - geopolitics - soleimani assassination
Initial Reactions from Russian Government to Assassination of Iranian Military Commander | soleimani
Reverse Engineering with Ghidra (W50) - Hakin9 - IT Security Magazine
China's Uighur Genocide Must Be Put on Trial - Uighur plight
Frequently Asked Questions | Offensive Security - certifications
How Worries About U.S. Dominance Gave Way to Worries About U.S. Decline - empire, China, geopolitics
Iran's Quds Force After Soleimani - qaani, geopolitics
Besides Potential Chinese Backdoors, 5G Has Security Problems the United States Doesn’t Want to Fix for Its Own Surveillance Purposes -The network has plenty of other security weaknesses, including ones the United States doesn’t want to fix since they help its own surveillance efforts - state surveillance, privacy, cyber warfare, espionnage
The Tianxia System | China Heritage Quarterly - empire, imperial China, world order, geopolitics
Why China Thinks It Can Build a Utopian World Order | tianxia, geopolitics, imperial, empires
The Carter Doctrine Conundrum: Has Trump Repudiated a Foundational Element of U.S. National Security Strategy? geopolitics
about:config - firefox config page
Iran’s Extensive Cruise Missile Program Requires U.S. Action | The Heritage Foundation - geopolitics, middle east - empires, hegemony
Trump Is Not Really Pro-Israel—He’s Pro-Trump - geopolitics
Google hackers successfully use clickless exploit to hack iPhone
GitHub - secdevops-cuse/CyberRange: The Open-Source AWS Cyber Range - hacking lab, pentestable vulnerable targets
Popular forms of cybercrime you should be aware of - BEC, Cyber Crime, Fraud, hacking, Malware, Phishing, Ransomware, Scam, security
5G Is More Secure Than 4G and 3G—Except When It’s Not | cyber security
GitHub - al0ne/nginx_log_check: Ngix - security
Security Vulnerabilities in the RCS Texting Protocol - cell phones, encryption, protocols, security engineering, SS7, vulnerabilities
5 Reasons Why Programmers Should Think like Hackers - secure coding
WhatsApp Fixes Yet Another Group Chat Security Gap | vulnerability
Hackers Could Use Smart Displays to Spy on Meetings | WIRED
Iranian Attacks on Industrial Control Systems - Schneier on Security - apt33 hacker group, cyber warfare
LifeLabs Paid Hackers to Recover Stolen Medical Data of 15 Million Canadians - ransomware
Google Offers Financial Support to Open Source Projects for Cybersecurity - bug bounty
Attacker Causes Epileptic Seizure over the Internet - crime, cybercrime, medicine, national security policy - epilepsy
Meet Cliff Stoll, the Mad Scientist Who Invented the Art of Hunting Hackers | cyber warfare
FBI warns against using free WiFi networks while traveling | sniffing
The Pentagon's AI Chief Prepares for Battle | cyber warfare, artificial intelligence tools, killer robots
Senators introduce K-12 Cybersecurity Act | ransomware
Member of 'The Dark Overlord' hacking group extradited to the US | anonymity throughout attack
Top 5 Essential Features of Effective Cybersecurity for Web Apps - monitoring, artificial intelligence
GitHub - imperva/automatic-api-attack-tool: Imperva's customizable API attack tool takes an API specification as an input, generates and runs attacks that are based on it as an output. - pentesting tool application programming interface
Lousy IoT Security - Schneier on Security - DTEN - cybersecurity, Internet of Things, security engineering, vulnerabilities
Apple Opens Its Invite-Only Bug Bounty Program to All Researchers
Facebook separates security tool from friend suggestions, citing privacy overhaul - two factor authentication
Uninstall ToTok, an Alleged Emirati Spy App, From Your Phone Now | A messaging app called ToTok had scores of positive reviews, particularly from users in the UAE. US intelligent officials say it may be spying for that government instead - YeeCall, DarkMatter - privacy, state surveillance, espionnage
The Worst Hacks of the Decade | 2010s - stuxnet
ToTok Is an Emirati Spying Tool - Apple, eavesdropping, Google, malware, phones, privacy, smartphones, spyware, surveillance, United Arab Emirates - state surveillance
How Organizations Can Defend Against Advanced Persistent Threats
Chinese Hackers Bypassing Two-Factor Authentication - hacking group is bypassing the RSA SecurID two-factor authentication system.
4 uses for programmable logic controllers in industrial settings - PLCs
Smart TVs make screenshots every second & send them to the server -IoT, Privacy, security, Smart TV, Technology - industrial privacy violations
BusKill USB cable switches off your laptop in the event of theft - BusKill, Linux, security, USB, Vulnerability
Getting a VPN in Japan - Browsing, internet, Japan, Privacy, security, Technology, VPN
Academic research finds five US telcos vulnerable to SIM swapping attacks | ZDNet
GitHub - ucsb-seclab/karonte: Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware - IoT
Proof-of-concept code published for Citrix bug as attacks intensify |Two Citrix bug (CVE-2019-19781) exploits have been published on GitHub yesterday, making future attacks trivial for most hackers
Sync files across multiple devices with Syncthing | shared folders
Facebook Says Encrypting Messenger by Default Will Take Years | privacy, end to end encryption, private secure messaging apps
Hundreds of millions of cable modems are vulnerable to new Cable Haunt vulnerability | Cable modems using Broadcom chips are vulnerable to a new vulnerability named Cable Haunt, researchers say
Police Surveillance Tools from Special Services Group - cameras, eavesdropping, espionage, FOIA, law enforcement, police, privacy,state surveillance
GitHub - sahilmgandhi/IotShark: IotShark - Monitoring and Analyzing IoT Traffic - iot flask-application scapy pyshark
Iranian Hackers Have Been ‘Password-Spraying’ the US electric plant Grid | hacking group Magnallium - cyber warfare
US wants to isolate power grids with 'retro' technology to limit cyber-attacks | SEIA bill, inspired by the 2015 cyber-attack on Ukraine's power grid, passes Senate - cyber warfare
How to Secure Nginx with Let's Encrypt on CentOS 8
What's HTTPS for secure computing? | trusted execution environment, tee, secure enclave
How the US Knew Iranian Missiles Were Coming Before They Hit | warfare
Did Donald Trump and Iran Use Twitter to Prevent a War? | warfare, diplomacy, twiplomacy
New SHA-1 Attack - SEIA bill, inspired by the 2015 cyber-attack on Ukraine's power grid, passes Senate - collision attack
GitHub - cve-search/git-vuln-finder: Finding potential software vulnerabilities from git commit messages - Finding potential software vulnerabilities from git commit messages. The output format is a JSON with the associated commit which could contain a fix regarding a software vulnerability. The search is based on a set of regular expressions against the commit messages only. If CVE IDs are present, those are added automatically in the output.
Iranian hackers deploy new ZeroCleare data-wiping malware | cyber warfare
Disk-wiping malware, phishing and espionage: How Iran's cyber attack capabilities stack up | definitive Iranian hacking groups, cyber warfare capabilities
USB Cable Kill Switch for Laptops - data protection, false positives, hardware, Linux, security engineering, theft
3 Google Play Store Apps Exploit Android Zero-Day Used by NSO Group
Half of the websites using WebAssembly use it for malicious purposes
How to Get Total Inodes of Root Partition
GitHub - weev3/LKWA: Lesser Known Web Attack Lab
Mailbox Master Keys - Schneier on Security
10 articles to enhance your security aptitude | devsecops pipeline, logging, firewalls, gpg ssh openssl, quantum computing, linux server
Linux users and permissions cheat sheet | Opensource.com
Microservices cheat sheet | Opensource.com
pip cheat sheet | Get to know the most useful pip commands to help you install, manage, and use Python software packages.
Getting started with Kubernetes | Opensource.com
Introducing the guide to inter-process communication in Linux | Opensource.com
How to Secure Your Wi-Fi Router and Protect Your Home Network | local area network lan
How the US Prepares Its Embassies for Potential Attacks | cyber warfare
The Most Dangerous People on the Internet This Decade | president xi xinping, trump, Putin,
Hacking School Surveillance Systems - Schneier on Security
How to find the best VPN service: Your guide to staying safe on the internet | definitive beginner guide
Jumping Rope for Cardio | Al Kavadlo
High Intensity Interval Training - calisthenics, cardio, sprint | Al Kavadlo
All Kinds of Pull-ups | calisthenics
Finding Your Target Heart Rate | calisthenics, cardio
Pain and Posture | calisthenics, spine health
The Skill of Strength | calisthenics
The Elusive Freestanding Handstand | calisthenics
In the Vault (Parkour and More) | calisthenics
Ask Al: How Do YOU Train? | program, calisthenics
Isometrics & Training for the Human Flag | calisthenics
All About the Human Flag (Part One) | calisthenics, isometrics
Active Recovery | calisthenics, rest
Death To Cardio | calisthenics, skills
Front Levers and Back Levers | calisthenics, planks
Elbow Levers | calisthenics, planks, isometrics
Grip Training and Antagonistic Balance | calisthenics
Planks and Side Planks | calisthenics, elbow
Jumping Jacks and More! | calisthenics, cardio, rope jumping
The Myth of Over-training | calisthenics, program
Body Weight Exercises | calisthenics
Plyometrics: Jump! Jump! | calisthenics, explosive, power
Oh Dip! | calisthenics, dips
Dead Hang Pull-ups w/ Danny Kavadlo | calisthenics
The One Arm Chin-up (May 2010) | calisthenics, pull up
How to Brute-Force SSH, FTP, VNC & More with BruteDum - password cracking
How to Hack Apache Tomcat via Malicious WAR File Upload - hacking web app
How to Use MDK3 for Advanced Wi-Fi Jamming - hacking, denial of service
What "allocation unit size" should I use for a drive with a single NTFS partition? definitive, block size, performance
Which Allocation Unit Size Is Best for Your Drive? ssd, hdd
Default cluster size for NTFS, FAT, and exFAT - cluster size
Difference between block size and cluster size - Unix & Linux Stack Exchange
Disk - Logical Block (or Cluster) [Gerardnico - The Data Blog]
Data cluster - Wikipedia
What is the difference between sector and cluster? - Super User
What are the differences between track, sector, cluster, and blocks related to a hard disk? - Quora
2.2. Sectors and Blocks
Blogs - Computer Repair Services New York - Alphaurax
De nouveaux documents relatifs au scandale Cambridge Analytica montrent que l'ingérence dans les élections présidentielles US n'était qu'une petite partie d'une opération mondiale plus vaste - privacy, mass surveillance
Sécurité : la police traque un présumé terroriste sur WhatsApp jusqu'à ce que son téléphone disparaisse de ses radars après une alerte de Facebook - NSO Group
Introducing BusKill: A Kill Cord for your Laptop - DIY
The Israeli right’s ‘plan’ for Jordan's King Abdullah - Israel News - Iran israel collusion - definitive
The secret Israel-Soviet Union war nobody knew about - Israel News - warfare, geopolitics, history
At cemeteries, the Sunni and Shia say the same prayers | Soleimani assassination | op ed, geopolitics, iran, Syria, irak
Report: Russia Hacked Ukrainian Energy Firm Tied To Impeachment Inquiry - geopolitics
Why Invading Iran Would Be a Military Disaster (Worse Than Vietnam) | The National Interest - warfare, geopolitics
Donald Trump’s rant against Iran is the howl of a dying empire | geopolitics, decline of american empire, imperialism, geopolitics
1956: Suez and the end of empire | decline collapse British empire - geopolitics, history, imperialism
Team Builds the First Living Robots | UVM Today | The University of Vermont - living robots
It is perfectly OK to only code at work, you can have a life too - learning, planning, personal projects schedule
SHA-1 is a Shambles First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust
SHA-1 is a Shambles - first chosen-prefix collision for SHA-1. In a nutshell, this means a complete and practical break of the SHA-1 hash function, with dangerous practical implications if you are still using this hash function. To put it in another way: all attacks that are practical on MD5 are now also practical on SHA-1
Airbnb Claims Its AI Can Predict Whether Guests Are Psychopaths - artificial intelligence
GitHub - beefytech/Beef: Beef Programming Language - low level performance oriented, C, C#
How to Break into Router Gateways with Patator « Null Byte :: WonderHowTo
How to Steal Ubuntu & MacOS Sudo Passwords Without Any Cracking « Null Byte :: WonderHowTo
How to Automate Brute-Force Attacks for Nmap Scans - hydra
How to Use SUDO_KILLER to Identify & Abuse Sudo Misconfigurations « Null Byte :: WonderHowTo
The US's top commander in the Pacific is sounding the alarm over China's 'wall of SAMs' in the South China Sea - geopolitics, warfare, anti-access/area-denial (A2/AD)
Israel's brain drain is the flight of the left - geopolitics, israel technological advantage
After watching 'Chernobyl,' one nagging question remains: What about Israel's nuclear reactor? dimona, geopolitics
Special Report:‘Time to take out our swords' - Inside Iran’s plot to attack Saudi Arabia - Aramco oil facility attack - 2019
Iran Is Ready for the Next Great War in the Middle East | geopolitics, warfare, abqaiq Aramco attack
Sensor - Wikipedia
These smart contact lenses equip your eyes with augmented reality -Augmented Reality, IoT, Privacy, Smart Tech, Technology
What's your favorite Linux terminal trick? | Opensource.com
How Modern Technology is Making Business Life Easier - company wise
GitHub - lachesis/scallion: GPU-based Onion Hash generator -Scallion lets you create vanity GPG keys and .onion addresses (for Tor's hidden services) using OpenCL.
7 things I learned from starting an open source project | Opensource.com
Get started with this open source to-do list manager | task manager, time manager
C vs. Rust: Which to choose for programming hardware abstractions | rust
A Windows 10 Vulnerability Was Used to Rickroll the NSA and Github | CVE-2020-0601
This Apple-FBI Fight Is Different From the Last One | In 2016 the iPhone encryption debate ended in a draw. Don't count on 2020's scuffle over the Pensacola shooter's devices to play out the same way - privacy, state surveillance
Critical Windows Vulnerability Discovered by NSA - certificates, cryptography, encryption, exploits, man-in-the-middle attacks, Microsoft, NSA, vulnerabilities, Windows, zero-day - cve-2020-0601
GitHub - cutaway-security/chaps: Configuration Hardening Assessment PowerShell Script (CHAPS)
All the Ways Facebook Tracks You—and How to Limit It | privacy
US troops deploying to the Middle East told to leave personal devices at home | cyber warfare
Artificial Personas and Public Discourse -  algorithms, artificial intelligence, botnets, deep fake, disinformation, essays, propaganda, social engineering, social media, voting
Report: Chinese hacking group APT40 hides behind network of front companies | cyber warfare
Now It's Really, Truly Time to Give Up Windows 7 | security
Soleimani and the weight of history | Iran, geopolitics, warfare
EsmaiI Qaani: New 'shadow commander' of Iran's Quds Force | Soleimani assassination | Al Jazeera
Can China Rise Peacefully? | The National Interest - multilateralism
Containing Tehran: Understanding Iran’s Power and Exploiting Its Vulnerabilities | Center for Strategic and International Studies - geopolitics, warfare - definitive
Former U.S. Marine: Suleimani’s Killing Is the Apotheosis of American 'Strategy' | geopolitics, warfare, iran
Scraping the Web Is a Powerful Tool. Clearview AI Abused It | WIRED
GitHub - microsoft/verona: Research programming language for concurrent ownership - rust based - secure coding
verona/explore.md at master · microsoft/verona - secure coding, rust based
How does PAE (Physical Address Extension) enable an address space larger than 4GB? - x86, 32-bit
Physical Address Extension - x86, 32-bit, paging
Why you should forget about 4GiB of RAM on 32-bit systems and move on - pae, PSE, PSE 36
WordPress plugin vulnerability can be exploited for total website takeover | ZDNet
Microsoft: Application Inspector is now open source, so use it to test code security | app security tool, analysis
JhoneRAT exploits cloud services to attack Middle Eastern countries | cyber warfare
Microsoft Warns of Unpatched IE Browser Zero-Day That's Under Active Attacks -CVE-2020-0674
Don't Ignore Chrome's New Password Checkup Feature | password strength
GitHub - l0ss/Grouper2: Find vulnerabilities in AD Group Policy - active directory
An Open Source Effort to Encrypt the Internet of Things | IoT security, encryption, cryptographie
GitHub - th3unkn0n/TeleGram-Scraper: telegram group scraper tool. fetch all information about group members - private messaging app
What you need to know about System76's open source firmware project | coreboot, This Q&A with System76 principal engineer Jeremy Soller discusses the company's project for an open source embedded controller.
SIM Hijacking, swapping - academic papers, authentication, cell phones, fraud, SIM cards, smartphones, usability
GitHub - hc0d3r/tas: A tiny framework for easily manipulate the tty and create fake binaries.
US Cyber Command was not prepared to handle the amount of data it hacked from ISIS | academic papers, authentication, cell phones, fraud, SIM cards, smartphones, usability - cyber warfare
Brain-hacking is the next big nightmare, so we'll need antivirus for the mind | privacy, surveillance
Clearview app lets police find your information with just a photo - AI - breach, Facial Recognition, FBI, Privacy, security, Surveillance, Technology
Cómo acelerar la web con C++ y WebAssembly |
Standards - Cryptographic Module Validation Program | Cryptographic Modules Standards. FIPS 140-2
The 5 Best Phones for Privacy & Security « Smartphones :: Gadget Hacks
Most Secure Android Phone in 2020 | Android Central
Top 10 Most Secure Smartphones:Surprisingly, Most Of Them Run Android
Which Are The Most Secure Smartphones (Update Jan 2020)
Is an Adapter and Converter the same thing? design patterns
Everything You Need to Know About HDMI Alt Mode and USB Type-C
Reconfiguration, Camouflage, and Color‐Shifting for Bioinspired Adaptive Hydrogel‐Based Millirobots - robots injected in brains to interact with neurons
Easily Exploitable Vulnerabilities Patched in WP Database Reset Plugin - WordPress
All ProtonVPN apps are 100% open source - ProtonVPN Blog
How To Download a Video From Any Website - firefox, element inspector
How to Get the Most Out of Your Smartphone's Encryption | signal, private secure messaging apps, privacy
The New Satellite Arms Race Threatening to Explode in Space | warfare, definitive GPS satellite
Russia's difficult balancing act between Iran and Israel - warfare, geopolitics
Watch SpaceX Launch Its Next Huge Batch of Starlink Satellites | oneweb
Elon Musk’s Mission to Mars | definitive, entrepreneurship, tech ideas
Figure Out Where You Are With Nothing But a Watch and Protractor | celestial navigation - exploration, travel
The Startup That Could Beat SpaceX to Building a Second Internet in Space | oneweb, starlink
10 ways to make your phone safer, according to security experts - juice jacking, jailbreaking, rooting, VPN
Apple iOS vs Android? Here is the most secure phone you can get - privacy
Sailfish OS - Wikipedia
Silent Circle (software) - secure communications
Sirin OS - Sirin Labs
Be Ready For Anything With the World's First Ultra-Secure Smartphone - katim dark matter - privacy
Totally tough and secure smartphone [IDEX19D3] | dark matter katim
Northern Norway accommodation: the best places to stay - travel, hostels, lodged, fishermen huts
SpaceX Wants to Launch Thousands of Satellites. What on Earth For? | starlink
Comparison of init systems - Gentoo Wiki
No systemd
What are the security implications of systemd compared to systemv init? - Information Security Stack Exchange
systemd : l’init martyrisé, l’init bafoué, mais l’init libéré ! - LinuxFr.org
Dhrystone - DMIPS (Dhrystone MIPS)
Fighting The Nazis Made The Soviet Union A Superpower | empire, geopolitics, warfare
Evangelicals are uniformly blessing Trump’s Israel plan – deal of the century, zionism, zionist evangelicals
Where Did AIPAC Come From? origins, American Zionist Council - zionism - history, warfare, geopolitics
It’s Time For AIPAC To Register As A Foreign Agent – zionism, geopolitics
How Saudi Arabia captured Washington - geopolitics, influence, think tanks, lobby
How to Hack with Arduino: Building MacOS Payloads for Inserting a Wi-Fi Backdoor - ESP8266 Wi-Fi development board
Hacking Windows 10: How to Hack uTorrent Clients & Backdoor the Operating System « Null Byte :: WonderHowTo
How to Hack Wi-Fi: Cracking WPA2 Wifi Passwords Using the New PMKID Hashcat Attack « Null Byte :: WonderHowTo
Conditional access - CAS - ECM, EMM
China is reportedly sending men to sleep in the same beds as Uighur Muslim women while their husbands are in prison camps
China is locking up its Muslim uighur minorities, and pushing Islamophobia to get Europe to do it too
China uses an intrusive surveillance app to track its Muslim minority, with technology that could be exported to the rest of the world. Here's how it works. - Uighur - artificial intelligence - privacy, state surveillance
Oscars 2020: Why people are talking about visual effects - de aging technology, the Irishman, star wars the rise of Skywalker, CGI Computer generated images
'The Irishman' Gets De-Aging Right—No Tracking Dots Necessary | CGI
The Irishman, Avengers: Endgame, and the De-aging Technology That Could Change Acting Forever | CGI, de aging technology
The Rise of the Open Bug Bounty Project
The Eye | archives, pirated resources, scientific publications, download resources
Why is the Palestinian Authority unable to mobilise its people? | Palestine | geopolitics, USA, middle east, israel
Sudo Bug Lets Non-Privileged Linux and macOS Users Run Commands as Root - CVE-2019-18634
Get your RSS feeds and podcasts in one place with this open source tool | Opensource.com
6 things you should be doing with Emacs | Opensource.com
How and why overloading, templates, and auto deduction were invented? c++
Everything We Know About the Jeff Bezos Phone Hack | WIRED
Elections Globally Are Under Threat. Here's How to Protect Them | cyber warfare
Inside Pwn2Own's High-Stakes Industrial Hacking Contest | bug bounty
The Sneaky Simple Malware That Hits Millions of Macs |Shlayer Trojan
Intel Is Patching the Patch for the Patch for Its ‘Zombieload’ Flaw | WIRED
How to Get the Most Out of Your Smartphone's Encryption | full disk encryption, privacy, state surveillance
The Fractured Future of Browser Privacy | WIRED
Mysterious New Ransomware Targets Industrial Control Systems | ekans, scada
The Iowa Caucus Tech Meltdown Is a Warning | voting machines
After the Iowa Caucus Meltdown, New Hampshire Says It’s Ready | voting machine
Facebook's Bug Bounty Caught a Data-Stealing Spree | privacy
How AI Is Tracking the Coronavirus Outbreak | artificial intelligence, health care systems
Hackers can steal data from air-gapped PC using screen brightness
Israeli government's Gov.il DNS server found vulnerable - hacking, Israel, security, SSL, Vulnerability, ssllabs qualyd
Hackers exploiting vulnerability in smart doors to launch DDoS attacks - yber Attack, Flaw, hacking, IoT, security, Smart Devices, Vulnerability
Cyber criminals using Coronavirus emergency to spread malware - China, Coronavirus, Cyber Crime, Emotet, Fraud, Japan, Scam, security, TROJAN
Enterprise laptops vulnerable to critical direct memory access attack - dma
UN hacked, becomes target of massive state-sponsored spying op - Cyber Attack, hacking, Malware, security, UN, United Nations - cyber warfare
Owner of DDoS mitigation firm launched DDoS attacks on others
GitHub - appsecco/dvna: Damn Vulnerable NodeJS Application - pentestable targets hacking lab
How to Deploy Nginx on a Kubernetes Cluster
How to Use Nginx as an HTTP Load Balancer in Linux
Pentoo - A Security-Focused Linux Distro Based on Gentoo - pentesting distro, Kali like
Scam, spam and phishing texts: How to spot SMS fraud and stay safe | smishing, sms phishing
Iowa caucus results delayed due to reporting 'inconsistencies' after switching to new tech system | voting machines
Apple Abandoned Plans for Encrypted iCloud Backup after FBI Complained - state surveillance
An ‘Off-the-Shelf, Skeleton Project’: Experts Analyze the App That Broke Iowa - Multiple experts analyzed Shadow Inc.’s Iowa caucus app. They found all kinds of problems - voting machines
Only 5 Nations Can Hit Any Place on Earth With a Missile. For Now. - The New York Times - icbm, iran, israel, geopolitics, warfare
Arbitrary Arrest and Torture Under the Palestinian Authority and Hamas | HRW - geopolitics, warfare
How to Use Banner Grabbing to Aid in Reconnaissance - nmap, telnet
How to Use Ettercap to Intercept Passwords with ARP Spoofing « Null Byte :: WonderHowTo
How Technology Strengthens Autocracy - privacy, state surveillance, geopolitics
A Deep Dive on End-to-End Encryption: How Do Public Key Encryption Systems Work? | Surveillance Self-Defense
Powerful Cyber Attack Takes Down 25% Of Iranian Internet - dzhafa shield, ddos, cyber warfare
NATIONAL INFORMATION NETWORK SECURITY SHIELD (aka Dejafa, Dezhfa) Component Details - The Cyber Shafarat - iran ddos shield, cyber warfare
T-Mobile for Business BrandVoice: Changing The Face Of Customer Engagement With 5G
China Fires ‘Great Cannon’ Cyber-Weapon At The Hong Kong Pro-Democracy Movement
China Fires ‘Great Cannon’ Cyber-Weapon At The Hong Kong Pro-Democracy Movement - ddos, cyber warfare, great China firewall
Bernie Sanders’ shocking hypocrisy – geopolitics, USA
China Should Fear the Coronavirus. Look What Plague Did to Ancient Athens. | Peloponnesian wars, thucydides - history, geopolitics, warfare, strategy
Le FBI aurait réussi à casser le service d'anonymat du réseau Tor pour arrêter Eric Marques, un magnat du darknet, qui a plaidé coupable - tor vulnerability, privacy, browser security
The Dark Side of Smart Lighting: Check Point Research Shows How Business and Home Networks Can Be Hacked from a Lightbulb - Check Point Software - smart home, IoT
App Used by Israel's Ruling Party Leaked Personal Data of All 6.5 Million Voters - cyber warfare, privacy
U.S. Charges 4 Chinese Military Hackers Over Equifax Data Breach
How to set up your own fast, private open source mesh network | Opensource.com
Reverse For Loops in C++20 - Fluent C++ - STD 20
Gaza Cybergang targeting Palestinian authority figures - molerats, cyber warfare
GitHub - taviso/ctftool: Interactive CTF Exploration Tool - text input processors, Microsoft text services, reverse-engineering windows windows-internals
GitHub - bl4ckmamb4/OpenRelayMagic: Tool to find SMTP servers vulnerable to open relay -Tool to find SMTP servers vulnerable to open relay
GitHub - aryanrtm/KawaiiDeauther: Jam all wifi clients/routers. - fake WiFi Access Points - jammer pentest network spam
GitHub - izar/pytm: A Pythonic framework for threat modeling -data-flow-diagram sequence-diagram dfd pythonic-framework threats
GitHub - matrix1001/heapinspect: 🔍Inspect heap in python -heap exploit pwn gdbheap - debugging, memory analysis, reverse engineering
Signal Is Finally Bringing Its Secure Messaging to the Masses - private secure messaging app
The 8 Best Robot Vacuums for Every Home and Budget (2020) | voting machine - election
The US Fears Huawei Because It Knows How Tempting Backdoors Are | 5 G networks, cyber warfare, China USA,
China's Hacking Spree Will Have a Decades-Long Fallout | Equifax. Anthem. Marriott. OPM. The data that China has amassed about US citizens will power its intelligence activities for a generation - cyber warfare
How 4 Chinese Hackers Allegedly Took Down Equifax | cyber warfare
Google's Giving Out Security Keys to Help Protect Campaigns | elections, advanced protection
Can the Government Buy Its Way Around the Fourth Amendment? | privacy, state mass surveillance
Conservative News Sites Track You Lots More Than Left-Leaning Ones | privacy, web tracking, surveillance
How to Set Up IPsec-based VPN with Strongswan on Debian and Ubuntu
Tor Browser: An Ultimate Web Browser for Anonymous Web Browsing in Linux - installation on linux
Companies that Scrape Your Email - Apple, data mining, e-mail, espionage, marketing, surveillance
Crypto AG Was Owned by the CIA - backdoors, CIA, cryptography, espionage
Apple's Tracking-Prevention Feature in Safari has a Privacy Bug -  Apple, leaks, privacy, surveillance, tracking, vulnerabilities
Unknown number of Bluetooth LE devices impacted by SweynTooth vulnerabilities |  Apple, leaks, privacy, surveillance, tracking, vulnerabilities
There's finally a way to remove xHelper, the unremovable Android malware | ZDNet
US Cyber Command, DHS, and FBI expose new North Korean malware | cyber warfare
Discord (software) - hacking gaming communication platform
Reader question, answered: If I have https, do I need a VPN? | ZDNet
IoT security: Five things to change to make your smart devices really secure | ZDNet
U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack — Coronavirus, Equifax breach, FBI Deputy Director David Bowdich, FBI Director Christopher Wray, Jun Ying, Liu Lei, Sudhakar Reddy Bonthu, U.S. Attorney General Bill Barr, U.S. Justice Department, Wang Qian, Wu Zhiyong, Xu Ke
Don’t Call It a Peace Plan - The American Prospect - trump koushner deal of century
How the Kushner Peace Plan Overturned Israeli Strategy | deal of century
Hillary Emails Reveal True Motive for Libya Intervention - NATO war libya 2011 - ghaddafi
Want to End Our Endless Wars? Remember the Peace of Westphalia | definitive, Libya, iran, geopolitics, interventionism, Clinton, NATO - thirty years war
Everyone is worried Trump will ruin the world order — but it never really existed - the end of history, geopolitics, definitive
How to Analyze Wi-Fi Data Captures with Jupyter Notebook « wireshark, sniffing, packet capture
How to Exploit WebDAV on a Server & Get a Shell « Web Distributed Authoring and Versioning protocol hacking
How to Catch USB Rubber Duckies on Your Computer with USBRip « Human interface attack
The rise and fall of the Isis 'caliphate' | geopolitics, warfare
هل يمكن اختراق المجتمع الإسرائيلي حقا؟! geopolitics, israel, history, zionism
الانقضاض على معاهدة لوزان.. هل اقترب انهيار الاتفاقية التي أسست لظهور دول الشرق الأوسط؟ Lausanne treaty, geopolitics, Ottoman empire, history
How China’s Coronavirus Incompetence Endangered the World - coronavirus, geopolitics, xi xinping
Russian Disinformation Takes on Coronavirus, Pointing a Finger at the United States - conspiracy theory, geopolitics, aids hiv
Personal API Keys · kodi jdf76/plugin.video.youtube Wiki · GitHub
Why the Global South should nationalise its data | corporate, industrial privacy violations
How to Hijack Chromecasts with CATT to Display Images, Messages, Videos, Sites & More « IoT hacking, security, smart home, tv
How to Find Exploits & Get Root with Linux Exploit Suggester « Null Byte :: WonderHowTo
How to Brute-Force Nearly Any Website Login with Hatch « password , cracking
DEFINITIVE - Why Training Your Tendons Is Important (and 11 Ways to Do It) | Mark's Daily Apple
How to Strengthen Tendons and Ligaments | Livestrong.com
Imbalances in the Development of Muscle and Tendon as Risk Factor for Tendinopathies in Youth Athletes: A Review of Current Evidence and Concepts of Prevention
Trouble in Tripoli: Why Europe Must Respond to the Ambitions of Libyan Warlord Khalifa Haftar | libyan crisis, geopolitics
Why are Central Asian countries so quiet on Uighur persecution? | Uighur | Al Jazeera - uyghur, geopolitics
CURRENT CONCEPTS IN MUSCLE STRETCHING FOR EXERCISE AND REHABILITATION
DEFINITIVE - Fox Kitten - Widespread Iranian Espionage-Offensive Campaign - ClearSky Cyber Security - apt33, apt34 - cyber warfare
DEFINITIVE - How the CIA used Crypto AG encryption devices to spy on countries for decades - Washington Post - cyber warfare, Crypto AG - geopolitics
comp3321 NSA Python Training Document : NSA : Free Download, Borrow, and Streaming : Internet Archive
The Neo-Malthusian World of the Coronavirus | geopolitics, history, population growth, climate change
CPU Death Match: A CPU Buyer's Guide for 2020 (No Matter Your Budget) |
Why AMD's Ryzen 9 3950X CPU Is Truly a Game Changer | The National Interest
Firefox continues push to bring DNS over HTTPS by default for US users - The Mozilla Blog
Insectothopter, CIA's UAV from the 1970s - The Black Vault - drone, cyber warfare, espionnage
BSD Punk - hacking articles, resources, infosec
That Time I Worked for A Criminal Organization - Open Monster Vision
DEFINITIVE - Latacora - Stop Using Encrypted Email - secure email services, PGP, age, worm hole, encryption, Signal messaging app, privacy, gmail
Model Hacking ADAS to Pave Safer Roads for Autonomous Vehicles | McAfee Blogs - Tesla, artificial intelligence hacking, fooling - visual recognition
Linux est prêt pour « la fin des temps » : un correctif du bogue de l'an 2038 vient d'être intégré à Linux 5.6 et permettra aux systèmes 32 bits de marcher après 2038, les travaux sont encore en cours - Y2038, time_t, 32-bit vs 64 - bit
Google says Microsoft Edge isn't secure. I asked Google why | ZDNet - secure browser
New Kr00k vulnerability lets attackers decrypt WiFi packets | using Broadcom and Cypress Wi-Fi chips.
Seven hackers have now made a million dollars each from bug bounties, says HackerOne | ZDNet - bug bounty
IoT security fail: The weird devices that employees are connecting to the office network | ZDNet
The dark side of IoT, AI and quantum computing: Hacking, data breaches and existential threat | ZDNet
Cybersecurity attacks on mobile, IoT proliferate: Will 5G make it better? | ZDNet
U.S. Policy on Settlements, Pre-Trump – Illegal or Not? - Foundation for Middle East Peace - zionist regime, occupation
Preparing Your Family for Coronavirus - survival tips, quarantine
Hackers and Spies Could Sabotage Coronavirus Pandemic Response - privacy, bio hazard
How to Discover & Attack Raspberry Pis Using Default Credentials with Rpi-hunter « Null Byte :: WonderHowTo
How to Dump a MacOS User's Chrome Passwords with EvilOSX « Null Byte :: WonderHowTo
This Unpatchable Flaw Affects All Intel CPUs Released in Last 5 Years
Iranian Hackers Exploiting VPN Flaws to Backdoor Organizations Worldwide
Tools for SSH key management | Opensource.com
Who cares about Emacs? | Opensource.com
Using C and C++ for data science | Opensource.com
Revive your RSS feed with Newsboat in the Linux terminal | Opensource.com
Getting started with Linux firewalls | Opensource.com
3 eBook readers for the Linux desktop | Opensource.com
An Unfixable Flaw Threatens 5 Years of Intel Chips | WIRED
The EARN IT Act Is a Sneak Attack on Encryption | WIRED
WireGuard Gives Linux a Faster, More Secure VPN | WIRED
A Flaw in Billions of Wi-Fi Chips Let Attackers Decrypt Data | kr00k
Israeli firm leaks database with addresses of millions of Americans
kr00k - Billions of Wi-Fi devices affected by encryption vulnerability
More on Crypto AG - assassinations, backdoors, CIA, cryptography, intelligence, privacy, surveillance
Security of Health Information - Covid19
Wi-Fi Chip Vulnerability - kr00k
Let's Encrypt Vulnerability - Schneier on Security
Firefox Enables DNS over HTTPS - Schneier on Security
Securing the Internet of Things through Class-Action Lawsuits - Schneier on Security
Russia Is Trying to Tap Transatlantic Cables - eavesdropping, Ireland, Russia, espionnage, cyber warfare
AMD processors from 2011 to 2019 vulnerable to two new attacks | Collide+Probe and Load+Reload
Hackers Were Inside Citrix for Five Months — Krebs on Security
Russie | Formalités d'entrée et contacts utiles | Routard.com - russia visa
Node.js Form Validation Using Datalize | Toptal
How to Make a Discord Bot: Overview and Tutorial | Toptal
Creating a Secure REST API in Node.js | Toptal - security, secure coding
AVIF for Next-Generation Image Coding - JPEG, image compression
Le cauchemar du 737 MAX ne cesse de s'aggraver, un rapport accablant des enquêteurs de la Chambre US montre la pire défaillance de sécurité dans l'avion cloué au sol à cause des problèmes logiciels - security flaw
Vulnerability During the 2010s decade - linux vs windows vs Mac os x
Tous les CPU commercialisés par Intel ces 5 dernières années sont exposés à une faille critique irrémédiable permettant à un attaquant de déjouer tous les dispositifs de sécurité intégrés à la puce - CVE-2019-0090, UEFI bios, DMA, rom
Human-operated ransomware attacks: A preventable disaster - PARINACOTA group , notpetya, wannacry
RSA 2020 : Microsoft insiste sur l'importance d'activer l'authentification multifacteur, un mécanisme qui permettrait pourtant de bloquer la plupart des attaques automatisées contre les comptes - MFA
Exclusive: Newly obtained documents show Huawei role in shipping prohibited U.S. gear to Iran - cyber warfare, geopolitics
How To Move To Turkey - The Definitive Guide | Expat
How to Brute-Force FTP Credentials & Get Server Access « Null Byte :: WonderHowTo
Adding a display to a travel-ready Raspberry Pi Zero | Opensource.com
Beware of 'Coronavirus Maps' – It's a malware infecting PCs to steal passwords
Introducing the guide to getting started with the Raspberry Pi | Opensource.com
What you need to know about variables in Emacs | Opensource.com
Drop Bash for fish shell to get beautiful defaults | Opensource.com
How many Raspberry Pis do you own? | Opensource.com
6 Raspberry Pi tutorials to try out | Opensource.com
Getting started with Emacs | Opensource.com
High-Stakes Security Setups Are Making Remote Work Impossible | WIRED
The Internet Avoided a Minor Disaster Last Week | let's encrypt bug
State-sponsored hackers are now using coronavirus lures to infect their targets | phishing
Watch Out for Coronavirus Phishing Scams | WIRED
Live Coronavirus Map Used to Spread Malware — Azorult, Coronavirus malware, Coronavirus map, COVID-19 malware, Johns Hopkins University
The Case for Limiting Your Browser Extensions — Krebs on Security
Crafty Web Skimming Domain Spoofs “https” — Krebs on Security - http.ps
NordVPN HTTP POST bug exposed customer information, no authentication required | ZDNet
Phishing: Google just made it easier to use 2FA to secure your accounts | ZDNet
Passwords belong in time capsules, not IT ecosystems | ZDNet
Brave to generate random browser fingerprints to preserve user privacy | ZDNet
Spying concerns raised over Iran's official COVID-19 detection app | ZDNet
How poor IoT security is allowing this 12-year-old malware to make a comeback | ZDNet
Identity management 101: How digital identity works in 2020 | ZDNet
Intel CPUs vulnerable to new LVI attacks | ZDNet
Modern RAM used for computers, smartphones still vulnerable to Rowhammer attacks | trr protections
Google: Linux systems can use this new tool against USB keystroke injection attacks | ZDNet
Why are governments so vulnerable to ransomware attacks? | ZDNet
Europol takes down SIM-swap hacking rings responsible for theft of millions of euros | ZDNet
Open-source security: This is why bugs in open-source software have hit a record high | ZDNet
Czech hospital hit by cyberattack while in the midst of a COVID-19 outbreak | ZDNet
How to Tell if a Website Has Been Compromised
GitHub - onSec-fr/Http-Asynchronous-Reverse-Shell: [POC] Asynchronous reverse shell using the HTTP protocol. -reverse-shell http pentesting command-control asynchronous-io
CIA Dirty Laundry Aired - vault7, wikileaks
The Whisper Secret-Sharing App Exposed Locations - blackmail, children, data collection, data loss, leaks, secret sharing
Ghost Framework - uses an ADB to remotely access an Android device
Ethical Hacking Best Practices: 9 Excellent Hacking Tools - WireShark Nmap Maltego Cain and Abel Faraday John the Ripper Kismet metasploit
Abaddon - makes red team operations faster, more repeatable and stealthier
WiFi Passview - An open source batch script based WiFi Passview
Final Recon - OSINT Tool for All-In-One Web Reconnaissance
DEFINITIVE - Simple Remote Code Execution Vulnerability Examples for Beginners | by Ozgur Alp - RCE Exploit
Making Sense of the Saudi-Russian Oil War - geopolitics, coronavirus
Linux Kernel Security (W45) - eForensics
PenTest: Build Your Own Pentest Lab in 2020 - Pentestmag
Country code top-level domain - ccTLD
Surge - Static web publishing for Front-End Developers Simple, single-command web publishing. Publish HTML, CSS, and JS for free, without leaving the command line.
TypeScript - ts, tsx typescript
Is there any downside to using .tsx instead of .ts all the times in typescript? - javascript reactjs typescript
Static vs Dynamic Websites - What's the Difference? - YouTube
Why I'm using Surge and not GitHub Pages - vs Netlify and Zeit Now - static site hosting, client side web application
Russia Strikes Back Where It Hurts: American Oil | vs Saudi Arabia, coronavirus, economic warfare
PenTest: Active Directory Pentesting - Pentestmag
Hacking macOS: How to Turn Forums into C&C Servers to Control MacBooks « Null Byte :: WonderHowTo
How to Steal Usernames & Passwords Stored in Firefox on Windows 10 Using a USB Rubber Ducky « Null Byte :: WonderHowTo
How technical debt is risking your security | Opensource.com - security debt, security by design, secure coding, sdlc
How CISOs Should Prepare for Coronavirus Related Cybersecurity Threats
Hackers Created Thousands of Coronavirus (COVID-19) Related Sites As Bait
How to create a personal file server with SSH on Linux | Opensource.com
Run a command on binary files with this script | Opensource.com
7 open hardware projects working to solve COVID-19 | Opensource.com
My top 6 open source frameworks for web development | Opensource.com
Top 10 open source tools for working from home | remote
Share data between C and Python with this messaging library | ZeroMQ
Make advanced Git tasks simple with Lazygit | Opensource.com
How to use Ranger for navigating files from the command line | Opensource.com
How to test failed authentication attempts with test-driven development | Opensource.com
How I migrated from a Mac Mini to a Raspberry Pi | Opensource.com
How Surveillance Could Save Lives Amid a Public Health Crisis | privacy
If Robots Steal So Many Jobs, Why Aren't They Saving Us Now? | covid 19
WhatsApp Is at the Center of Coronavirus Response | WIRED
Coronavirus Sets the Stage for Hacking Mayhem | WIRED
The Best and Worst Browsers for Privacy, Ranked | Google Chrome, Mozilla Firefox, Apple Safari, Brave, Edge, and Yandex
The Value and Ethics of Using Phone Data to Monitor Covid-19 | privacy
How Microsoft Dismantled the Infamous Necurs Botnet | WIRED
'Kill Chain': HBO's Election Security Doc Stresses Urgency | hacking voting machine
German army's sensitive data found on laptop bought from eBay - secure deletion
All the major Intel vulnerabilities | ZDNet
Alphabet website for novel coronavirus screening and testing is now live | ZDNet
HHS targeted by hackers as it responds to novel coronavirus, COVID-19 pandemic | cyber warfare
Working from home: Cybersecurity tips for remote workers | ZDNet
Intel CPUs vulnerable to new 'Snoop' attack | Foreshadow
Roundup: Coronavirus COVID-19 pandemic delivers array of cybersecurity challenges | ZDNet
Coronavirus related cyber attacks hit HHS in US, testing center in Czech -Coronavirus, CovidLock, Cyber Attack, DDOS, hacking, Malware, Ransomware
Google & Microsoft launch tools to address Coronavirus outbreak
GitHub - flipkart-incubator/Astra: Automated Security Testing For REST API's
GitHub - m3n0sd0n4ld/uDork
GitHub - luisfontes19/xxexploiter: Tool to help exploit XXE vulnerabilities
GitHub - sshuttle/sshuttle: Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Supports DNS tunneling.
GitHub - jesseduffield/lazydocker: The lazier way to manage everything docker
GitHub - skelsec/pypykatz: Mimikatz implementation in pure Python
Work-from-Home Security Advice - remote work - COVID-19, epidemiology, infrastructure, security awareness, VPN, vulnerabilities
Emergency Surveillance During COVID-19 Crisis - China, COVID-19, data collection, EFF, epidemiology, Iran, Israel, national security policy, privacy, surveillance
Relax-and-Recover - Backup and Recover a Linux System
Hacking Voice Assistants with Ultrasonic Waves - Schneier on Security
Our post-coronavirus future: 7 ways the tech and services industry could be transformed | Will the pandemic blow away every tech business assumption we've ever held, from 5G and bandwidth to legacy tech and the cloud? Here's one thing I expect: The rise of the phablet.
VPN use surges as coronavirus outbreak prompts huge rise in remote working | ZDNet
A professor says Edge is the worst for privacy. Microsoft isn't happy | ZDNet
Remote working: Security tips for working from home | ZDNet
COVID-19: With everyone working from home, VPN security has now become paramount | DHS, SANS, NJCCIC, and Radware warn companies about securing enterprise VPN servers in the midst of the coronavirus outbreak and when a vast majority of employees are working from home.
A spike in home workers raises MFA resilience questions | multi factor authentication
Windows 10: This kernel malware is why you need Secured-core PCs, says Microsoft | ZDNet
Monotonic AI Models: Sound Logic for Machine Learning | artificial intelligence, machine learning
Will Eating Spinach Like Popeye Really Make You Stronger?
Using cryptographically random password as both the password and the salt - Cryptography Stack Exchange
Line by line encrypted logging stored with iv/salt/iterations. How safe is it? - aes gcm pbkdf-2
I'm trying to understand which cryptographic algorithm is this - RC4, cryptanalysis, encryption algorithm identification
How much would it cost in U.S. dollars to brute force a 256 bit key in a year? definitive, Bruce schneier quote
Theoretically, what if I were to change some magic numbers in, say, AES? - s-box
Amount of simple operations that is safely out of reach for all humanity? brute force symmetric key, AES
"This is a SOCKS Proxy, Not An HTTP Proxy" - Tor Stack Exchange
Should I use a VPN with Orbot? - Tor Stack Exchange
How to Hack with Arduino: Tracking Which Networks a Mac Has Connected To & When « ESP8266 MCUs Hacking macOS
Hacking Windows 10: How to Use SSH Tunnels to Forward Requests & Hack Remote Routers « Null Byte :: WonderHowTo
How to Spy on SSH Sessions with SSHPry2.0 « Null Byte :: WonderHowTo
How to Phish for Social Media & Other Account Passwords with BlackEye « Null Byte :: WonderHowTo
Password reset giving clues of possible valid email addresses - password-reset user-enumeration
Is there any way to access the contents of a cross domain iframe - web-application web-browser iframe crossdomain
How to rate a CVSS score for a vulnerability on an identity provider - Information Security Stack Exchange
How to secure REST API for parameter manipulation? - Information Security Stack Exchange
What are the Linux hibernation feature threats? encryption, hibernation file
What is the difference between a relative phase and a global phase? In particular, what is a phase? - Quantum Computing Stack Exchange
What is 'Surface Code'? (Quantum Error Correction) - Quantum Computing Stack Exchange
How do you write a simple program for a D-Wave device? - Quantum Computing Stack Exchange
How should I understand the change of qubit's basis as a rotation? - quantum-state bloch-sphere unitarity hadamard
How should I understand the link between x and |x>? - Quantum Computing Stack Exchange
Find reference to string in radare2 - Reverse Engineering Stack Exchange
Unpacking binaries in a generic way - Reverse Engineering Stack Exchange
Function Prologue, add esp directive - Reverse Engineering Stack Exchange
The Cyber Mentor - YouTube - hacking resources
Linux for Ethical Hackers (Kali Linux Tutorial) - YouTube
The Site Reliability Workbook
Google - Site Reliability Engineering
The Cyber Mentor (@thecybermentor) / Twitter - hacking resources
you need to learn Docker RIGHT NOW!! // Docker Containers 101 - YouTube - Definitive intro
GitHub - deepanshululla/Network-security: CS6740 Spring 2016 Network Security Class Codes - 1) ARP cache poisoning 2) ICMP Redirect Attack 3) SYN Flooding Attack 4) TCP RST Attacks on telnet and SSH Connections 5) TCP RST Attacks on Video Streaming Applications 6) ICMP Blind Connection-Reset and Source-Quench Attacks 7) TCP Session Hijacking - Attacks on Layer2,3,4 Protocols - Pharming attacks on DNS - Secure File Transfer protocol in C
DEFINITIVE - C++ - `const` is a contract – Arthur O'Dwyer – Stuff mostly about C++ - const-ness - const_cast, pointers vs references
editor - How to make vim paste from (and copy to) system's clipboard? - :set paste
memory - Why are buffer overflows executed in the direction they are? - definitive explanation, cpu architecture x86, x64 - endianness
CWE - CWE-170: Improper Null Termination (4.0) - string termination vulnerability, null terminator
Secure Coding in C and C++ - string termination vulnerabilities, null terminator - secure coding
DEFINITIVE - Why is it dangerous when an attacker can control the `n` parameter to `memcpy()`? - MMU - heartbleed - buffer overflow, stack smashing - ASLR - return-to-libc, return-oriented-programming attacks - secure coding
DEFINITIVE - exploit - How do ASLR and DEP work? - Address Space Layout Randomization, Data Execution Prevention - shellcode, return oriented programming ROP - secure coding
buffer overflow - Security Implications of Neglecting the Extra Byte for NULL Termination in C/C++ Arrays - buffer overlow, string termination vulnerability, null terminator - secure coding
appsec - Topics for SecureCoding course in C - definitive list of resources - hacking challenges
professional education - Programming language for network security - Lua, Python
DEFINITIVE - ExploitingBooks: Reversing & Exploiting Books Collection - reverse engineering, binary exploitation
hdbreaker (Alejandro Parodi) · GitHub - exploits resources - malwares
ISO/IEC TR 24731-1 - n1225.pdf - RSIZE, rsize_t, secure coding in C
restrict type qualifier in C
restrict - type qualifiers for pointers to object types - pointer aliasing, optimizations - undefined behavior
restrict keyword in C - GeeksforGeeks
What does the restrict keyword mean in C++? - __restrict__ - optimization
What does the restrict keyword mean in C++? - __restrict__ - optimization
DEFINITIVE - Demystifying The Restrict Keyword - memory aliasing -
c - Realistic usage of the C99 'restrict' keyword? - pointer aliasing - optimization - assembly - definitive explanation
set_constraint_handler_s, constraint_handler_t - __STDC_WANT_LIB_EXT1__, __STDC_LIB_EXT1__
dm-crypt - Linux Unified Key Setup (LUKS) - initrd - software based FDE full disk encryption
Trusted Computing Group - Media Room - Self-Encrypting Drives Based On New Trusted Computing Group Specifications Now Available - TCG Opal
SSDs with usable built-in hardware-based full disk encryption - secure erase - definitive discussion
Is SSD Encryption Really Secure? Maybe Not, Blog | ATA security, TCG Opal
What is the difference between hardware vs software-based encryption for secure USB flash drives? -FDE
grub - How to avoid interference of os-prober with an encrypted partition - full disk encryption, LUKS
dual boot - What is a block device? - definitive
DEFINITIVE - An Introduction to Storage Terminology and Concepts in Linux | MBR/GPT - block/device storage, partitions - ext4, xfs, btrfs, zfs filesystems - mounting - /etc/fstab - RAID - LVM
Python Scapy vs dpkt - Stack Overflow
Mail Forensics - electronic evidence Search and Seizure (S&S) procedures, techniques and tools for email forensics, phishing for data, and email header forensics - home malware analysis lab, e-banking, honeypots
Android Mobile Forensics (W46) - eForensics - rfid nfc, secure boot, sim card analysis, avd, adb, genymotion, Stock/Custom ROM - Rooting - architecture, patitionning, forensics
DEFINITIVE - The Suddenly Remote Playbook | productivity, security - teleworking, remote working
Advanced Linux Exploit Development - Linux Internals BoF in Linux Heap overflow ELF PLT GOT SGID SUID Abusing EIP - ASLR Stack Cookie RELRO No execute Bypassing techniques - ROP basics ROP big picture Exploiting ROP X86 basics TCP shellcode X64 shellcode - What is format string? Format string security flaws Exploiting format string
Malware and Cyber Attacks during COVID-19 - fileless malware attacks, point of sale malware, attempts to secure healthcare, password cracking
How To Use SFTP to Securely Transfer Files with a Remote Server | DigitalOcean
Seven Properties of Highly Secure Devices - IoT security
100 Genius Solutions To Everyday Problems You Didn't Know Existed - ideas
DEFINITIVE - Paul Graham – How to Get Startup Ideas | Genius - tech idea
DEFINITIVE - How to Get Startup Ideas - original essay
Trigger warning: New app warns Netflix viewers of graphic content - SFChronicle.com - tech idea - feerless - explicit content, inappropriate scenes
DEFINITIVE - Organic Startup Ideas - tech startup idea
DEFINITIVE - The Top Idea in Your Mind - startup tech ida
DEFINITIVE - Tech Ideas for Startups
DEFINITIVE - Why Smart People Have Bad Ideas - tech startup ideas
DEFINITIVE - Essays - tech startup ideas
DEFINITIVE - Startup FAQ - tech startup ideas -
Mattermost vs Riot/Matrix: Who is winning as an open-source Slack alternative? - self-hosted Slack Alternative
Time to replace Slack! Who will win, MatterMost or Riot/Matrix? definitive comparison - security, privacy
DEFINITIVE - Frighteningly Ambitious Startup Ideas - tech idea
DEFINITIVE - How to Be Silicon Valley - tech ideas
[Notes] How To Get Startup Ideas — Paul Graham - summary
How to Get Startup Ideas by Paul Graham – summary
grsecurity - Huawei HKSP Introduces Trivially Exploitable Vulnerability - cyber warfare , china
How to Find OSINT Data on License Plate Numbers with Skiptracer - Privacy, people tracking, car tracking, intelligence/Information gathering - VIN Vehicle Identification Numbers - xillwillx
Vehicle identification number - VIN
How to Hunt Down Social Media Accounts by Usernames with Sherlock « OSINT - social media accounts, web scraping
How to Clear the Logs & History on Linux Systems to Cover Your Tracks & Remain Undetected « anonymity throughout attack, tracks covering, logs erasure/deletion - covermyass - maintaining access, persistence
Bypass Antivirus Software by Obfuscating Your Payloads with Graffiti « malware obfuscation, antivirus evasion, evading
Learn How to Play the Market with This Data-Driven Trading Bundle « Trading
7 Best Wix Alternatives in 2020 (More Powerful and Reliable) - web development - wordpress, constant contact, cheao hosting - BigCommerce, shopify
PenTest: MITRE ATT&CK in Practice - Pentestmag
What is VPN Tethering? Can you use Tethering with a VPN? | VPNT.com
privacy - How to share VPN connection with devices on hotspot?
Share a VPN Connection from Your Windows PC | virtual router
How to Create a Portable Hotspot on Android with VPN on - F-Secure Blog - tethering
How to Use TimeShift to Backup and Restore Ubuntu Linux
How to Upgrade Ubuntu 18.04 LTS to Ubuntu 20.04 LTS.
​How to Upgrade to Ubuntu 20.04 | Linuxize
[CVE] Prochain composant - nsouiki@wyplay.com - Wyplay Mail
Access local LAN and VPN network Simultaneously | LAN-Tech Network Management
HTTP Live Streaming - Wikipedia
The Ultimate Guide to Identifying Which CMS Is Used on a Website - tech stack - wappalyzer alternatives
How to identify which CMS is used on a website? website tech stack indentification - wappalyzer alternatives
Identify & Analyze Web Site Tech Stacks With rappalyzer | rud.is - wappalyzer alternatives
How To Hide The Fact That Your Website Runs On WordPress | Elegant Themes Blog - hide website tech stack,
Home · urbanadventurer/WhatWeb Wiki - website tech stack identifiers - wappalyzer alternative
WhatWeb & Wappalyzer Online Website Recon | HackerTarget.com - website tech stack identifiers, fingerprint
laravel - Hide the technology behind the a web application - hide website tech stack - obfuscation
BuiltWith Technology Lookup - website tech stack fingerprint/identification - wappalyzer alternative
security - How To Hide From BuiltWith? - Webmasters Stack Exchange - website tech stack, fingerprint obfuscation
How can we hide the tech stack of a website? obfuscation
Configuring Your Web Server to Not Disclose Its Identity | Acunetix - website tech stack hiding, obfuscation
A practical approach for defeating Nmap OS-Fingerprinting - how does nmap work - hiding webserver tech stack, obfuscation
Defeating TCP/IP Stack Fingerprinting - hiding webserver tech stack, obfuscation
Clever Trickery | Nmap Network Scanning - hiding webserver tech stack, obfuscation
Defeating Nmap Scans - hiding webserver tech stack, fingerprint obfuscation
operating systems - Is it possible to defeat the OS detection capabilities of network scanning tools? - hiding webserver tech stack, fingerprint detection obfuscation
Searching for expressions which include slashes | Vim Tips Wiki | Fandom
Hyperloop Alpha - hyperloop-alpha.pdf - Elon Musk seminal paper
What it took for Elon Musk’s SpaceX to disrupt Boeing, leapfrog NASA, and become a serious space company — tech ideas, startups
Defeating Quantum Algorithms with Hash Functions – Kudelski Security Research
Are cryptographic hash functions quantum secure? - grover algorithm, quadratic speedup, NP completeness, factorization problem - collision finding
Arch Intranet Search Engine - Open source, enterprise strength, fast and easy to setup corporate search - local search engine
DFINITIVE - Why the Lean Start-Up Changes Everything - tech ideas, entrepreneurship
Hype Cycle Research Methodology - ideation, tech idea, startup, entrepreneurship
Domain hacks - hostnames - ccTLD - SLDs second level domains
How to Create Python3 Virtual Environments on Ubuntu 18.04 | Linuxize
The Startup Pivot Pyramid - 500 Insights - Lean Startup - Ideation -
Product Hunt - database for tech ideas - definitive - technological watch
Laundromatch - Airbnb for laundry machines | Product Hunt - tech idea
PyTorch - Machine Learning/Deep Learning Module - Artificial Intelligence - Computer vision, NLP Natural Language Processing - Tensor Computing, Deep neural networks
pickle — Python object serialization — vs serialize, marshall - security, arbitrary code execution vulnerability when unpickling untrusted malicious data
How to Start a Startup - tech ideas - lectures - paul graham
python - Need to turn YouTube link into sound file more quickly - pytube vs youtube-dl
pytube3 — pytube3 9.6.4 documentation
Difference between .bashrc and .bash_profile, .profile, .inputrc - Super User
Hitchhiker's guide to the Python imports | There is no magic here - packages, definitive - code distribution
Cellular neural network - CNN - pplications include image processing, analyzing 3D surfaces, solving partial differential equations, reducing non-visual problems to geometric maps, modelling biological vision and other sensory-motor organs
Python Imaging Library - PIL, pillow
Mel-frequency cepstrum - MFC - Fourier transforms - speech recognition
Cepstrum - fourier analysis
Mel scale - Wikipedia
How to Install Python3 Pip on Ubuntu 20.04 | pip3 install -r requirements.txt - python2
geizhals.eu EU - definitive price comparison portal - ecommerce, electronics, laptops, cheap - europe
Dvorak keyboard layout - suitable for programming
I’ve used Dvorak for 10 years, and I’m here to tell you it’s not all that - vs qwerty
GitHub - samhocevar/wincompose: 🔣 Compose Key for Windows - typing french characters é ž à ō û ø on qwerty
Passer de l’AZERTY au QWERTY sans stress post traumatique | lepetitjournal.com
14 raisons pour passer au clavier Dvorak - Sunfox
SCAN UK | PC components and online computer shop - ecommerce, electronics, europe
What is torch.nn really? — PyTorch Tutorials 1.5.1 documentation - tutorial - neural network
DEFINITIVE - Practical Deep Learning for Coders, v3 | fast.ai course v3 - recommended by pytorch tutorial - Artificial Intelligence
DEFINITIVE - Recommended Python learning resources ✅ - Part 1 (2019) - Deep Learning Course Forums - tutorials, courses
DEFINITIVE - fast.ai · Making neural networks uncool again - artificial intelligence for coders
Project Jupyter - IPython notebook
Table of contents — voila 0.1.21 documentation - jupyter server extension
VirusTotal Tools | Didier Stevens
Machine learning for malware detection
Customer Reviews: ASUS ROG Zephyrus G14 14" Gaming Laptop AMD Ryzen 9 16GB Memory NVIDIA GeForce RTX 2060 Max-Q 1TB SSD Moonlight White GA401IV-BR9N6 - Best Buy - tips
Faire les accents sur clavier qwerty [Résolu] - français, azerty
Top 10 Best Laptops for Programmers 2020 | ComputingForGeeks - coding outdoors, screen brightness, oled
DEFINITIVE - What is a GPU and do you need one in Deep Learning? | by Jason Dsouza | Towards Data Science -hardware, neural networks training - vram - Cloud
DEFINITIVE - [D] Which GPU(s) to Get for Deep Learning: My Experience and Advice for Using GPUs in Deep Learning : MachineLearning
Kaggle - Wikipedia - machine learning/artificial intelligence competition
Picking a GPU for Deep Learning. Buyer’s guide in 2019 | by Slav Ivanov | Slav - nvidia vs amd - CUDA, pytorch, tenseflow - vram
VIM: Jump Back To Previous or Last Cursor Position - nixCraft
VIM: Jump Back/Move To Previous or Last Cursor Position - nixCraft
Heuristic - Wikipedia
Heuristic (computer science) - Wikipedia
Metaheuristic - Wikipedia
Shift your security scanning left... no, further left | GitLab - DevSecOps
OSCP - My take
ASUS Battery Health Charging - Introduction | Official Support | ASUS USA - keep charger plugged in
Alt + arrow keys for Home/End/PgUp/PgDown - AutoHotkey Community - mini keyboards
Commit Often, Perfect Later, Publish Once—Git Best Practices - pipeline CI/CD
Explained! The Concept of Keyring in Ubuntu Linux
assert in production code at DuckDuckGo
Advanced Configuration and Power Interface - Wikipedia
assert in production code at DuckDuckGo
NTP time synchronization - - Stack Overflow
memcpy ALTERNATIVE C++ - Recherche Google
memcpy safety site:stackoverflow.com - Google Search
Executing External Programs Securely - exec family - Secure Programming Cookbook for C and C++ [Book] - secure coding - security
Introduction to Hardware Security - Embedded Systems Security, Security Models, Side Channels Attacks SCA, Fault Attacks FA, Invasive Attacks
memcpy, memcpy_s - cppreference.com
How to Turn Off Secure Boot on Surface: 9 Steps (with Pictures)
What does it mean "Processing Triggers for..." after installing/Uninstalling? - Ask Ubuntu
Difference between .bashrc and .bash_profile - Super User
Direct memory access - Wikipedia
AMD and Intel alternatives - Definitive real world applications of CPUs architectures x86, ARM, MIPS, PowerPC.
about:blank
Adding kill switches to protect your privacy is not as simple as you might think | privacy, state surveillance
c - memcpy() vs memmove() - Stack Overflow
Write your own memcpy() and memmove() - GeeksforGeeks
frameworks - Creating a module system (dynamic loading) in C - Stack Overflow
c - memcpy() vs memmove() - Stack Overflow
frameworks - Creating a module system (dynamic loading) in C - Stack Overflow
Write your own memcpy() and memmove() - GeeksforGeeks
Security Analysis of Firefox WebExtensions - Firefox Quantum security model - sandbox - anatomy of extensions - definitive
DEFINITIVE - Adam Harvey - Fooling state surveillance, face recognition - privacy, physical privacy
How to Improve Your Email Security - PGP
Home · richardfrost/AdvancedProfanityFilter Wiki · GitHub - subtitles, captions analysis
IATA - International Travel Document News - covid world borders map - definitive
Information Security Bookmarks. This is my bookmarks for learning… | by Diogo Felix | Medium- academic courses - definitive resources list -
Kill The Yak | No-BS guides to get your project rolling - definitive clear and concise how tos
Kill The Yak | spoof my MAC address
Downloading an Entire Web Site with wget | Linux Journal
Kill The Yak | wget an entire website
Process Injection and Persistence using Application Shimming | Andrea Fortuna
Event Triggered Execution: Application Shimming, Sub-technique T1546.011 - Enterprise | MITRE ATT&CK® - persistence, dll process injection
eu-15-Pierce-Defending-Against-Malicious-Application-Compatibility-Shims-wp.pdf
DEFINITIVE - Ten process injection- techniques: A technical survey of common and trending process injection techniques - shim vs hooking - DLL injection, IAT/Inline hooking aka userland rootkits
Linux shim for Patching executable in run-time | by Lucas Teske | Medium
Demystifying Shims - or - Using the App Compat Toolkit to make your old stuff work with your new stuff - vs API hooking
Regular-Expressions.info - Regex Tutorial, Examples and Reference - Regexp Patterns
html - RegEx match open tags except XHTML self-contained tags - Stack Overflow - data science, web scraping
regex - What is a non-capturing group in regular expressions? - Stack Overflow
[2020 Detailed Guide] How to Develop iOS Apps on Windows
How To Develop iOS Apps On Windows: iOS Application Development
DEFINITIVE - A Deep Look at JSON vs. XML, Part 1: The History of Each | Toptal - AJAX
Media type - MIME
Byte order mark - endianness
JSON - syntax, data types, YAML, XSS attacks, xml
XPInstall - XPI - Cross Platform Install - pronounced zippy - mozilla extensions
BQP - bounded-error quantum polynomial time (BQP) is the class of decision problems solvable by a quantum computer in polynomial time, with an error probability of at most 1/3 for all instances.[1] It is the quantum analogue to the complexity class BPP
BPP (complexity) - bounded-error quantum polynomial time (BQP) is the class of decision problems solvable by a quantum computer in polynomial time, with an error probability of at most 1/3 for all instances.[1] It is the quantum analogue to the complexity class BPP - vs BQP
BEAM robotics - Biology, Electronics, Aesthetics and Mechanics
How to Make Wealth - definitive - how to sell a startup
Startup = Growth - startup ideas - definitive - acquisition - funding, VC investment
Reductio/argumentum ad absurdum - apagogical arguments, negation introduction or the appeal to extremes - logic - proof by contradiction
Founder Control - board of directors - startups - retaining control
Relentlessly Resourceful - startup founder qualities
How Not to Die - mental attitude in startp founder - determination - getting demoralized
keyboard-shortcuts-windows - visual studio code - cheat sheet
IconBeast Lite | 500 Free iOS Tab Bar Icons for iPhone and iPad
Free Icons by Aha-Soft on Iconfinder.com
Working with JavaScript across Web Files | DigitalOcean - html - script markup,
javascript - Back-tick vs single quote in js - Stack Overflow
8 Best Free File Search Tools - local search engine - search file content
Category:Desktop search engines - local search engines
Everything you should know about the Quantum Development Kit, but were afraid to ask | Q# Blog - definitive - QDK
DEFINITIVE - The Founder’s Guide to Selling Your Company | Hacker News
DEFINITIVE - The Founder’s Guide To Selling Your Company | by Justin Kan | Justin Kan - merge and acquisitions - startup valuation
Prebuilt product-targets/randland-32.7.6.1 - nsouiki@wyplay.com - Wyplay Mail
What Startups Are Really Like - DEFINITVE - qualities, determination, tech ideas
CERT Secure Coding Books
Blaster (computer worm) - Wikipedia
perfect secrecy - One time pad: why is it useless in practice? information theoretic security - vernam cypher
DEFINITIVE - Advantage of secure quantum key distribution over post-quantum cryptography - asymmetric/public key cryptography - NP-completeness, NP, BQP - cryptanalysis - information-theoretic/unconditionnal security
complexity theory - Are there many practical problems for which Grover's algorithm beats the best heuristic classical algorithm? - Quantum Computing Stack Exchange
cryptography - What measures can be taken against attacks on cryptosystems by quantum computers other than just classifying research? quantum resistant, post quantum cryptography - problems outside of BQP, QMA-hard
QMA - NP, MA, BQP
cryptography - Quantum computing and blockchain technology - Quantum Computing Stack Exchange
quantum state - How to encode a qubit in standard basis? QKD Quantum Key Distribution
Quantum computers and intractable (NP-complete) computing problems
Quantum superiority for verifying NP-complete problems with linear optics | npj Quantum Information
The 18 Mistakes That Kill Startups - definitive - how to avoid failure
Heisenbug - aka bohrbug, mandelbug, hindenbug, and schrödinbug - debugging
Paul Graham | Start-Up - on lean startups
Deconstructing Lean Startup: Four Perspectives | by Ash Maurya | Love the Problem - Paul Graham opinion
javascript - Hoisting/Reordering in C, C++ and Java: Must variable declarations always be on top in a context? - Stack Overflow
Review of the new Firefox developer browser. Built for developers. - vs chrome developer tools
Series A Guide: Fundraising, Series A | Y Combinator - investors, investment
Ramen Profitable - investment, fundraising, saving mpney
How to Start a Startup - definitive -
Good and Bad Procrastination - problem solving - getting things done
Taste for Makers - design - definitive - beauty
Google JavaScript Style Guide - coding style
DEFINITIVE - Half-Assed Startup: Start your company and keep your day job - Venture Hacks - part time startup - co-founders, ideation, tech ideas, tractability - launching early
The importance of launching early and staying alive - David Rusenko - startup
You Weren't Meant to Have a Boss - independance, startup, freedom, big companies, natural way of life
Linear algebra for quantum computing - Microsoft Quantum | Microsoft Docs - linear algebra resources
Quantum Computing for Computer Scientists - YouTube - microsoft, q#*
Why It's Safe for Founders to Be Nice - growth - founder's qualities
The Fatal Pinch - fundraising - failure - startup
The Modern JavaScript Tutorial - definitive - interactive exercises
Closure (computer programming) - Wikipedia
Frighteningly Ambitious Startup Ideas - hard problem solving - facing big problem -
DEFINITIVE - Schlep Blindness - ideation - tech ideas involving tedious boring tasks - how to find ideas - disabling filters
DEFINITIVE - Why Smart People Have Bad Ideas - tech ideas - ideation - ideas finding
Succinctness is Power - python language
Taste for Makers - Design, ergonomics, aesthetics, user experience UX - definitive
Quantum walks and search algorithms - CERN Document Server
DEFINITIVE - A Student's Guide to Startups - tech ideas, ideation - startup ideas vs class projects
Failed IPOs | Toptal - going public - definitive explanation - pros/cons
How does JavaScript’s Math.random() generate random numbers? | Hacker Noon- PRNG
Random Number Generation in JavaScript - data visualization, performance, tools and workflow - Bocoup - PRNG
Copenhagen interpretation - quantum computing - coherence/decoherence
Inbox (967) - nsouiki@wyplay.com - Wyplay Mail
Usenet - Wikipedia
List of all Windows 10 keyboard shortcuts: The ultimate guide | Windows Central - definitive